Please enable JavaScript to use CodeHS

MO 9-10: NI.C.01

CodeHS Lessons

Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.

Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
10.7 Network Management
Standard
5.1 Network Attacks
5.4 Additional Attacks
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
6.8 Application Security
6.9 Browser Configuration
6.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
4.15 Network Management
Standard
1.6 Privacy & Security
3.15 Network Management
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
5.12 Network Communication
5.13 Network Management
8.3 Network Attacks
8.6 Additional Attacks
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
5.7 Network Management
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
7.9 Cybersecurity
9.4 System Administration
11.3 Network Management
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
9.7 Network Management
13.1 Network Attacks
13.4 Additional Attacks
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
3.6 Privacy & Security