Please enable JavaScript to use CodeHS

KS 9-12: L1.NI.NCO.02

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
4.8 Application Security
Standard
5.1 Network Attacks
5.3 Common Network Attacks
5.6 Internal Threats
8.2 Assessing Risks
8.3 Risk Response
Standard
13.7 Network Attacks
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
12.9 Common Security Problems
Standard
5.8 Application Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.3 Network Attacks
8.5 Common Network Attacks
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
14.9 Common Security Problems
Standard
6.6 Application Security
9.9 Common Security Problems
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Network Administration
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
3.6 Application Security
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.8 Application Security
Standard
8.5 Application Security
Standard
4.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.1 Network Attacks
17.9 Common Security Problems
17.9 Common Security Problems
13.2 Assessing Risks
13.3 Risk Response
Standard
7.9 Cybersecurity
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
7.4 Common Security Problems
13.1 Network Attacks
13.3 Common Network Attacks
13.6 Internal Threats
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.6 Application Security
Standard
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security