Please enable JavaScript to use CodeHS

ID 6-8: 6-8.IC.01

CodeHS Lessons

Explore security risks associated with using weak passwords, lack of encryption and/or insecure transactions.

Standard
4.10 System Administration
Standard
6.4 Cybersecurity
6.5 The CIA Triad
6.6 Encryption
Standard
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption
Standard
13.7 Network Attacks
13.8 The CIA Triad
Standard
9.4 Privacy & Security
15.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.7 Privacy & Security
Standard
5.10 System Administration
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.9 System Administration
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
8.7 Network Attacks
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.4 The CIA Triad
Standard
11.3 The CIA Triad
12.4 Privacy & Security
13.8 System Administration
Standard
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption
Standard
1.4 The CIA Triad
6.8 System Administration
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
8.4 Privacy & Security
16.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.4 Privacy & Security
6.9 Network Attacks
Standard
2.4 Privacy & Security
5.9 Network Attacks
Standard
1.8 System Administration
Standard
2.1 Privacy & Security
3.8 System Administration
Standard
5.2 The CIA Triad
5.6 Privacy & Security
Standard
4.4 Cybersecurity
4.5 The CIA Triad
4.6 Encryption
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.6 Cybersecurity
4.8 Encryption
Standard
4.6 Cybersecurity
4.8 Encryption
Standard
4.10 System Administration
Standard
4.10 System Administration
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
10.10 System Administration
Standard
4.4 Privacy & Security
11.4 The CIA Triad
Standard
1.4 Privacy & Security
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.5 The CIA Triad
2.4 Privacy & Security
7.8 System Administration
Standard
9.3 The CIA Triad
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.8 System Administration
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.8 System Administration
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
4.4 Cybersecurity
4.5 The CIA Triad
4.6 Encryption
Standard
1.8 System Administration
Standard
1.4 The CIA Triad
2.4 Privacy & Security
7.8 System Administration
Standard
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.6 Cybersecurity
4.7 The CIA Triad
4.8 Encryption