Please enable JavaScript to use CodeHS

NY 7-8: 7-8.CY.1

CodeHS Lessons

Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.

Standard
6.4 Cybersecurity
6.5 The CIA Triad
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
9.4 Privacy & Security
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 The CIA Triad
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.4 The CIA Triad
Standard
11.3 The CIA Triad
12.4 Privacy & Security
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
16.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.4 Privacy & Security
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
Standard
5.2 The CIA Triad
5.6 Privacy & Security
Standard
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.6 Cybersecurity
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
11.4 The CIA Triad
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.5 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
Standard
9.3 The CIA Triad
Standard
10.4 Privacy & Security
15.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.4 The CIA Triad
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis