Please enable JavaScript to use CodeHS

Natrona CS Principles: L1.NI.C.01

CodeHS Lessons

Give examples to illustrate how sensitive data can be affected by malware and other attacks.

Standard
11.9 Cybersecurity
Standard
14.1 Introduction to Cybersecurity
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
2.1 Introduction to Cybersecurity
Standard
2.1 Introduction to Cybersecurity
Standard
1.1 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.1 What is Cybersecurity?
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
22.11 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
16.2 What is Cybersecurity?
8.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
2.4 Privacy & Security
8.1 Network Attacks
8.2 Malware Types and Prevention
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
13.6 Internal Threats
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security