Please enable JavaScript to use CodeHS

KS 9-12: L1.NI.NCO.02

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
4.8 Application Security
Standard
3.1 Network Attacks
3.3 Common Network Attacks
3.6 Internal Threats
9.2 Assessing Risks
9.3 Risk Response
Standard
13.7 Network Attacks
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
12.9 Common Security Problems
Standard
5.8 Application Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.8 Common Security Problems
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.3 Network Attacks
8.5 Common Network Attacks
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
14.9 Common Security Problems
Standard
2.9 Application Security
Standard
6.6 Application Security
9.9 Common Security Problems
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Network Administration
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
3.6 Application Security
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.1 Network Attacks
17.9 Common Security Problems
17.9 Common Security Problems
13.2 Assessing Risks
13.3 Risk Response
Standard
6.10 Cybersecurity
Standard
5.8 Application Security
Standard
3.6 Application Security
7.8 Risk Response
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
7.4 Common Security Problems
13.1 Network Attacks
13.3 Common Network Attacks
13.6 Internal Threats
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.6 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.8 Application Security