Please enable JavaScript to use CodeHS

OH 9-12 FDN: IC.SLE.9-12.F.a

CodeHS Lessons

Interpret and analyze breaches in privacy and security to investigate the legal and ethical impact.

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
4.12 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
3.12 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
5.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Hacking Ethics
5.8 The Impact of the Internet
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
8.8 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
8.4 Privacy & Security
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.13 Hacking Ethics
8.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
3.7 The Impact of the Internet
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.12 Hacking Ethics
5.7 The Impact of the Internet
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
13.2 Assessing Risks
13.3 Risk Response
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
2.4 Hacking Ethics
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
15.2 Assessing Risks
15.3 Risk Response
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.8 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
13.2 Assessing Risks
13.3 Risk Response
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.11 Hacking Ethics
4.7 The Impact of the Internet
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security
3.11 Hacking Ethics
4.7 The Impact of the Internet