Please enable JavaScript to use CodeHS

MO 9-10: NI.C.01

CodeHS Lessons

Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.

5.6 Cybersecurity
7.8 Browser Configuration
5.6 Cybersecurity
6.8 Browser Configuration
1.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
7.7 Network Management
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
2.4 Privacy & Security
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
10.6 Network Communication
10.7 Network Management
14.1 Network Attacks
14.4 Additional Attacks
16.2 Assessing Risks
16.3 Risk Response
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
4.4 Privacy & Security
1.6 Privacy & Security
9.4 Privacy & Security
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
10.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
4.4 Privacy & Security
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
11.6 Network Communication
11.7 Network Management
13.2 Assessing Risks
13.3 Risk Response
1.6 Privacy & Security
1.5 Network Communication
1.8 Application Security
1.9 System Administration
4.5 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
1.6 Privacy & Security
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
4.12 Network Management
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
11.7 Network Management
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
5.1 Network Attacks
5.4 Additional Attacks
8.2 Assessing Risks
8.3 Risk Response