Please enable JavaScript to use CodeHS

OK 6-8: 7.NI.C.01

CodeHS Lessons

Explain how to protect electronic information, both physical (e.g. hard drive) and digital, identify cybersecurity concerns and options to address issues with the Internet and the systems it uses.

Standard
1.4 The CIA Triad
7.6 Application Security
7.8 System Administration
8.9 Common Security Problems
Standard
6.4 Cybersecurity
6.5 The CIA Triad
6.6 Encryption
Standard
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption
Standard
15.4 The CIA Triad
Standard
13.7 Network Attacks
13.8 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
12.9 Common Security Problems
Standard
5.8 Application Security
5.10 System Administration
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.8 Application Security
1.9 System Administration
2.8 Network Administration
4.4 The CIA Triad
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.2 The CIA Triad
1.12 Common Security Problems
8.7 Network Attacks
Standard
11.3 The CIA Triad
13.6 Application Security
13.8 System Administration
14.9 Common Security Problems
Standard
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption
Standard
1.4 The CIA Triad
6.6 Application Security
6.8 System Administration
9.9 Common Security Problems
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
3.6 Application Security
3.8 System Administration
Standard
13.4 The CIA Triad
Standard
16.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
Standard
5.9 Network Attacks
5.10 Network Administration
Standard
1.6 Application Security
1.8 System Administration
Standard
3.6 Application Security
3.8 System Administration
Standard
5.2 The CIA Triad
Standard
4.4 Cybersecurity
4.5 The CIA Triad
4.6 Encryption
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
10.8 Application Security
10.10 System Administration
Standard
11.4 The CIA Triad
Standard
1.5 The CIA Triad
7.6 Application Security
7.8 System Administration
17.9 Common Security Problems
17.9 Common Security Problems
Standard
9.3 The CIA Triad
9.4 System Administration
Standard
6.6 Application Security
6.8 System Administration
7.4 Common Security Problems
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
4.6 Application Security
4.8 System Administration
5.10 Common Security Problems
Standard
13.4 The CIA Triad
Standard
4.4 Cybersecurity
4.5 The CIA Triad
4.6 Encryption
Standard
1.6 Application Security
1.8 System Administration
Standard
3.2 The CIA Triad