Please enable JavaScript to use CodeHS

IL 9-10: 9-10.NI.07

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
4.8 Application Security
4.10 System Administration
Standard
5.2 Malware Types and Prevention
8.2 Assessing Risks
Standard
12.9 The Impact of the Internet
41.1 Cryptography
Standard
5.8 Application Security
5.10 System Administration
Standard
1.8 Application Security
1.9 System Administration
Standard
8.4 Malware Types and Prevention
Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
13.6 Application Security
13.8 System Administration
Standard
6.6 Application Security
6.8 System Administration
12.2 Assessing Risks
Standard
3.6 Application Security
3.8 System Administration
Standard
4.6 Application Security
4.8 System Administration
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
1.6 Application Security
1.8 System Administration
Standard
3.6 Application Security
3.8 System Administration
Standard
4.8 Application Security
4.10 System Administration
Standard
6.10 Cryptography
7.9 Cybersecurity
7.10 The Impact of the Internet
8.5 Application Security
Standard
4.8 Application Security
4.10 System Administration
Standard
10.8 Application Security
10.10 System Administration
Standard
7.6 Application Security
7.8 System Administration
8.2 Malware Types and Prevention
13.2 Assessing Risks
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
9.4 System Administration
Standard
6.6 Application Security
6.8 System Administration
13.2 Malware Types and Prevention
15.2 Assessing Risks
Standard
4.6 Application Security
4.8 System Administration
13.2 Assessing Risks
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.8 System Administration
Standard
7.8 Cryptography
10.9 Cybersecurity
10.10 The Impact of the Internet
Standard
7.6 Application Security
7.8 System Administration