Please enable JavaScript to use CodeHS

Natrona CS Principles: L1.NI.C.03

CodeHS Lessons

Compare various security measures, considering trade-offs between the usability and security of a computing system.

Standard
11.9 Cybersecurity
Standard
14.8 Basic Cybersecurity Risk Concepts
Standard
1.4 The CIA Triad
7.7 Browser Configuration
7.8 System Administration
Standard
7.4 Level 4: Data and Licenses
7.5 Level 5: Change Management
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
10.1 Basic Cybersecurity Risk Concepts
Standard
10.1 Basic Cybersecurity Risk Concepts
Standard
1.3 The CIA Triad
Standard
6.9 Browser Configuration
6.10 System Administration
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.9 System Administration
4.4 The CIA Triad
Standard
11.9 Cybersecurity
Standard
11.3 The CIA Triad
13.7 Browser Configuration
13.8 System Administration
Standard
1.4 The CIA Triad
6.7 Browser Configuration
6.8 System Administration
11.4 Level 4: Data and Licenses
11.5 Level 5: Change Management
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
3.7 Browser Configuration
3.8 System Administration
Standard
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
16.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
2.6 Level 4: Data and Licenses
2.7 Level 5: Change Management
3.7 Browser Configuration
3.8 System Administration
Standard
5.2 The CIA Triad
5.8 Browser Configuration
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
10.9 Browser Configuration
10.10 System Administration
Standard
11.4 The CIA Triad
Standard
1.5 The CIA Triad
7.7 Browser Configuration
7.8 System Administration
19.5 Level 5: Change Management
19.4 Level 4: Data and Licenses
Standard
7.9 Cybersecurity
9.3 The CIA Triad
9.4 System Administration
Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
6.7 Browser Configuration
6.8 System Administration
14.4 Level 4: Data and Licenses
14.5 Level 5: Change Management
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
4.7 Browser Configuration
4.8 System Administration
7.4 Level 4: Data and Licenses
7.5 Level 5: Change Management
Standard
13.4 The CIA Triad
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
3.2 The CIA Triad
Standard
2.5 The CIA Triad