Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.2

CodeHS Lessons

Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
Standard
9.4 Privacy & Security
15.4 The CIA Triad
Standard
1.4 The CIA Triad
2.4 Privacy & Security
7.6 Application Security
Standard
3.2 Environmental Controls
5.2 Malware Types and Prevention
Standard
13.8 The CIA Triad
Standard
5.3 Security in Game Design
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.8 Application Security
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
6.9 Environmental Controls
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.4 The CIA Triad
Standard
1.4 The CIA Triad
6.6 Application Security
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
8.10 Cybersecurity
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
7.13 Ethical Issues Around Data Collection
Standard
1.4 Environmental Controls
2.1 Privacy & Security
3.6 Application Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
1.5 The CIA Triad
2.4 Privacy & Security
7.6 Application Security
8.2 Malware Types and Prevention
Standard
7.9 Cybersecurity
9.3 The CIA Triad
Standard
10.4 Privacy & Security
14.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.6 Application Security
7.13 Ethical Issues Around Data Collection
Standard
1.5 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
6.6 Application Security
14.2 Malware Types and Prevention
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.6 Application Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection