Please enable JavaScript to use CodeHS

Natrona CS Principles: L1.NI.C.02

CodeHS Lessons

Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
14.11 Cybersecurity Risk Model-Security Controls
Standard
1.4 The CIA Triad
7.7 Browser Configuration
7.8 System Administration
Standard
3.1 Network Administrator
3.2 Environmental Controls
3.4 Private Networks
3.6 Access Control
6.1 Project Security Assessment Report
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
10.4 Cybersecurity Risk Model-Security Controls
Standard
10.4 Cybersecurity Risk Model-Security Controls
Standard
1.3 The CIA Triad
Standard
6.9 Browser Configuration
6.10 System Administration
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.9 System Administration
4.4 The CIA Triad
Standard
5.11 Network Administrator
6.9 Environmental Controls
Standard
11.9 Cybersecurity
Standard
11.3 The CIA Triad
13.7 Browser Configuration
13.8 System Administration
Standard
1.4 The CIA Triad
6.7 Browser Configuration
6.8 System Administration
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
3.7 Browser Configuration
3.8 System Administration
Standard
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
16.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.4 Environmental Controls
3.7 Browser Configuration
3.8 System Administration
4.8 Network Administrator
Standard
5.2 The CIA Triad
5.8 Browser Configuration
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
10.9 Browser Configuration
10.10 System Administration
Standard
11.4 The CIA Triad
Standard
1.5 The CIA Triad
7.7 Browser Configuration
7.8 System Administration
18.6 Access Control
18.6 Access Control
18.4 Private Networks
18.4 Private Networks
18.2 Environmental Controls
18.1 Network Administrator
Standard
7.9 Cybersecurity
9.3 The CIA Triad
9.4 System Administration
Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
6.7 Browser Configuration
6.8 System Administration
8.11 Access Control
9.8 Private Networks
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
4.7 Browser Configuration
4.8 System Administration
Standard
13.4 The CIA Triad
Standard
5.5 Private Networks
5.6 Cybersecurity
5.7 Network Administrator
6.8 Browser Configuration
Standard
5.5 Private Networks
5.6 Cybersecurity
5.7 Network Administrator
7.8 Browser Configuration
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
3.2 The CIA Triad
Standard
2.5 The CIA Triad