Please enable JavaScript to use CodeHS

Montana 9-12: CS.IC.9-12.10

CodeHS Lessons

explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users;

Standard
7.7 Ethical Issues Around Data Collection
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
6.5 The CIA Triad
Standard
1.4 Digital Footprint and Reputation
Standard
2.5 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
Standard
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.1 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 What is Cybersecurity?
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.3 Internet Safety
12.4 Privacy & Security
Standard
2.5 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
16.2 What is Cybersecurity?
16.4 The CIA Triad
8.1 Digital Footprint and Reputation
8.3 Internet Safety
8.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.5 Internet Safety
5.6 Privacy & Security
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
6.10 Cryptography
7.9 Cybersecurity
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
Standard
9.1 What is Cybersecurity?
9.3 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
2.1 What is Cybersecurity?
2.2 The CIA Triad
Standard
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
14.7 Ethical Issues Around Data Collection
Standard
13.7 Ethical Issues Around Data Collection
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
7.13 Ethical Issues Around Data Collection
Standard
7.8 Cryptography
10.9 Cybersecurity
Standard
1.2 What is Cybersecurity?
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.7 The CIA Triad