Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.2

CodeHS Lessons

Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
Standard
1.4 The CIA Triad
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
Standard
3.1 Network Administrator
3.2 Environmental Controls
3.4 Private Networks
3.5 Mobile Devices
3.6 Access Control
5.2 Malware Types and Prevention
5.6 Internal Threats
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
9.4 Privacy & Security
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
5.3 Security in Game Design
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
6.8 Application Security
9.13 Ethical Issues Around Data Collection
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.8 Application Security
4.4 The CIA Triad
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
3.7 Mobile Devices
5.11 Network Administrator
6.9 Environmental Controls
8.4 Malware Types and Prevention
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.2 The CIA Triad
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.4 The CIA Triad
Standard
11.3 The CIA Triad
12.4 Privacy & Security
13.6 Application Security
Standard
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
16.4 The CIA Triad
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.4 Privacy & Security
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
7.13 Ethical Issues Around Data Collection
Standard
1.4 Environmental Controls
2.1 Privacy & Security
3.6 Application Security
4.8 Network Administrator
4.14 Mobile Devices
Standard
5.2 The CIA Triad
5.6 Privacy & Security
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
11.4 The CIA Triad
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.5 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
18.6 Access Control
18.6 Access Control
8.2 Malware Types and Prevention
18.4 Private Networks
18.4 Private Networks
18.2 Environmental Controls
18.5 Mobile Devices
18.1 Network Administrator
Standard
7.9 Cybersecurity
9.3 The CIA Triad
Standard
10.4 Privacy & Security
15.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
6.6 Application Security
8.11 Access Control
9.8 Private Networks
13.2 Malware Types and Prevention
13.6 Internal Threats
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.6 Application Security
4.10 Mobile Devices
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.4 The CIA Triad
Standard
5.5 Private Networks
5.6 Cybersecurity
5.7 Network Administrator
14.7 Ethical Issues Around Data Collection
Standard
5.5 Private Networks
5.6 Cybersecurity
5.7 Network Administrator
13.7 Ethical Issues Around Data Collection
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
7.13 Ethical Issues Around Data Collection
Standard
10.9 Cybersecurity
Standard
3.2 The CIA Triad
3.6 Privacy & Security
Standard
2.5 The CIA Triad