Please enable JavaScript to use CodeHS

Natrona CS Principles: L1.NI.C.04

CodeHS Lessons

Explain trade-offs when selecting and implementing cybersecurity recommendations.

Standard
11.9 Cybersecurity
Standard
14.11 Cybersecurity Risk Model-Security Controls
Standard
1.4 The CIA Triad
Standard
3.1 Network Administrator
3.5 Mobile Devices
7.4 Level 4: Data and Licenses
7.5 Level 5: Change Management
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
10.4 Cybersecurity Risk Model-Security Controls
Standard
10.4 Cybersecurity Risk Model-Security Controls
Standard
1.3 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
3.7 Mobile Devices
5.11 Network Administrator
Standard
11.9 Cybersecurity
Standard
1.4 The CIA Triad
11.4 Level 4: Data and Licenses
11.5 Level 5: Change Management
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
16.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
2.6 Level 4: Data and Licenses
2.7 Level 5: Change Management
4.8 Network Administrator
4.14 Mobile Devices
Standard
5.2 The CIA Triad
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
11.4 The CIA Triad
Standard
1.5 The CIA Triad
19.4 Level 4: Data and Licenses
19.5 Level 5: Change Management
18.5 Mobile Devices
18.1 Network Administrator
Standard
7.9 Cybersecurity
9.3 The CIA Triad
Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
14.4 Level 4: Data and Licenses
14.5 Level 5: Change Management
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
4.10 Mobile Devices
7.4 Level 4: Data and Licenses
7.5 Level 5: Change Management
Standard
13.4 The CIA Triad
Standard
5.6 Cybersecurity
5.7 Network Administrator
Standard
5.6 Cybersecurity
5.7 Network Administrator
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity
Standard
3.2 The CIA Triad
Standard
2.5 The CIA Triad