Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.1

CodeHS Lessons

Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.

Standard
5.10 Ethical and Social Implications of Computing
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
Standard
9.4 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
Standard
7.4 Level 4: Data and Licenses
Standard
5.1 Copyright Rules
5.3 Security in Game Design
Standard
4.2 Quality Datasets
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
4.18 Ethical and Social Implications of Computing
5.13 Ethical Issues Around Data Collection
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
11.9 Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.6 Application Security
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.10 Cybersecurity
Standard
8.10 Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
3.6 Application Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.6 Application Security
Standard
7.9 Cybersecurity
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Application Security
6.18 Ethical and Social Implications of Computing
7.13 Ethical Issues Around Data Collection
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.6 Application Security
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
7.4 Level 4: Data and Licenses
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
5.6 Cybersecurity
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
11.10 Ethical and Social Implications of Computing
13.7 Ethical Issues Around Data Collection