Please enable JavaScript to use CodeHS

KY 9-12: H-NI-02

CodeHS Lessons

Give examples to illustrate how sensitive data can be affected by viruses, malware and other attacks.

1.12 Common Security Problems
8.7 Network Attacks
22.10 Types of SQLi and Prevention
6.9 Network Attacks
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
1.3 Impact of Cybersecurity
6.6 Application Security
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
1.3 Impact of Cybersecurity
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
14.1 Network Attacks
14.2 Malware Types and Prevention
1.3 Impact of Cybersecurity
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
1.4 Impact of Cybersecurity
7.6 Application Security
8.1 Network Attacks
8.2 Malware Types and Prevention
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
1.3 Impact of Cybersecurity
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
13.9 Impact of Cybersecurity
13.7 Network Attacks
15.3 Impact of Cybersecurity
14.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
1.8 Application Security
4.2 Impact of Cybersecurity
1.3 Impact of Cybersecurity
3.6 Application Security
1.6 Application Security
5.1 Network Attacks
5.2 Malware Types and Prevention