Please enable JavaScript to use CodeHS

OH 9-12 FDN: IC.SLE.9-12.F.a

CodeHS Lessons

Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact.

Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
4.12 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
3.12 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
5.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
5.8 The Impact of the Internet
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
8.8 The Impact of the Internet
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
8.4 Privacy & Security
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.13 Hacking Ethics
8.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
3.7 The Impact of the Internet
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.12 Hacking Ethics
5.7 The Impact of the Internet
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
13.2 Assessing Risks
13.3 Risk Response
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
2.4 Hacking Ethics
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
15.2 Assessing Risks
15.3 Risk Response
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.8 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
13.2 Assessing Risks
13.3 Risk Response
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet