Please enable JavaScript to use CodeHS

Montana 9-12: CS.IC.9-12.10

CodeHS Lessons

explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;

1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
13.1 What is Cybersecurity?
13.8 The CIA Triad
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
14.2 What is Cybersecurity?
14.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
1.2 What is Cybersecurity?
1.4 The CIA Triad
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
4.1 What is Cybersecurity?
4.4 The CIA Triad
4.5 Privacy & Security
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.2 What is Cybersecurity?
2.1 Privacy & Security
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
7.13 Ethical Issues Around Data Collection
13.7 Ethical Issues Around Data Collection
14.7 Ethical Issues Around Data Collection
7.7 Ethical Issues Around Data Collection
5.13 Ethical Issues Around Data Collection
8.10 Cryptography
11.9 Cybersecurity