Please enable JavaScript to use CodeHS

Nevada Advanced CS I: 6.2.2

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts

Standard
11.9 Cybersecurity
Standard
4.9 Browser Configuration
4.10 System Administration
Standard
3.5 Mobile Devices
3.6 Access Control
5.2 Malware Types and Prevention
5.6 Internal Threats
7.2 Level 2: User Training
7.3 Level 3: Incident Response
7.4 Level 4: Data and Licenses
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
1.9 System Administration
Standard
3.7 Mobile Devices
8.4 Malware Types and Prevention
8.7 Internal Threats
Standard
11.9 Cybersecurity
Standard
13.7 Browser Configuration
13.8 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
11.2 Level 2: User Training
11.3 Level 3: Incident Response
11.4 Level 4: Data and Licenses
Standard
3.7 Browser Configuration
3.8 System Administration
Standard
4.7 Browser Configuration
4.8 System Administration
Standard
8.10 Cybersecurity
Standard
2.4 Level 2: User Training
2.5 Level 3: Incident Response
2.6 Level 4: Data and Licenses
3.7 Browser Configuration
3.8 System Administration
4.14 Mobile Devices
Standard
5.8 Browser Configuration
Standard
4.9 Browser Configuration
4.10 System Administration
Standard
7.9 Cybersecurity
Standard
4.9 Browser Configuration
4.10 System Administration
Standard
10.9 Browser Configuration
10.10 System Administration
Standard
7.7 Browser Configuration
7.8 System Administration
18.6 Access Control
18.6 Access Control
8.2 Malware Types and Prevention
19.2 Level 2: User Training
19.3 Level 3: Incident Response
19.4 Level 4: Data and Licenses
18.5 Mobile Devices
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
8.11 Access Control
13.2 Malware Types and Prevention
13.6 Internal Threats
14.2 Level 2: User Training
14.3 Level 3: Incident Response
14.4 Level 4: Data and Licenses
Standard
4.7 Browser Configuration
4.8 System Administration
4.10 Mobile Devices
7.2 Level 2: User Training
7.3 Level 3: Incident Response
7.4 Level 4: Data and Licenses
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
7.7 Browser Configuration
7.8 System Administration