Please enable JavaScript to use CodeHS

IL 9-10: 9-10.NI.06

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
4.8 Application Security
4.10 System Administration
Standard
1.6 Asymmetric Encryption
5.2 Malware Types and Prevention
Standard
12.9 The Impact of the Internet
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.8 System Administration
Standard
4.6 Asymmetric Encryption
6.6 Application Security
6.8 System Administration
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.6 Application Security
3.8 System Administration
Standard
4.6 Application Security
4.8 System Administration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.8 System Administration
Standard
2.1 Privacy & Security
3.6 Application Security
3.8 System Administration
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.8 Application Security
4.10 System Administration
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
8.5 Application Security
Standard
4.8 Application Security
4.10 System Administration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
10.10 System Administration
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
5.6 Asymmetric Encryption
7.6 Application Security
7.8 System Administration
8.2 Malware Types and Prevention
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.8 System Administration
13.2 Malware Types and Prevention
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.8 System Administration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.8 System Administration
Standard
10.9 Cybersecurity
10.10 The Impact of the Internet
Standard
2.4 Privacy & Security
7.6 Application Security
7.8 System Administration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security