Please enable JavaScript to use CodeHS

MD 9-10: 10.NI.C.01

CodeHS Lessons

Illustrate how sensitive data and critical infrastructure can be affected by malware and other attacks and recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
2.4 Privacy & Security
5.9 Network Attacks
5.10 Securing a Network
2.8 Securing a Network
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.4 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
14.1 Network Attacks
14.2 Malware Types and Prevention
14.3 Common Network Attacks
14.5 Cross-site Scripting
16.2 Assessing Risks
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
8.1 Network Attacks
8.2 Malware Types and Prevention
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
13.2 Assessing Risks
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
1.3 Privacy & Security
1.6 Common Security Problems
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.5 Cross-site Scripting
8.2 Assessing Risks
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.5 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
10.4 Privacy & Security
14.3 Impact of Cybersecurity
14.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
4.4 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
1.1 What is Cybersecurity?
1.3 Privacy & Security