- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
OK 6-8: 7.NI.C.01
CodeHS Lessons
Explain how to protect electronic information, both physical (e.g. hard drive) and digital, identify cybersecurity concerns and options to address issues with the Internet and the systems it uses.
Standard |
4.8 Application Security |
4.10 System Administration |
Standard |
6.4 Cybersecurity |
6.5 The CIA Triad |
6.6 Encryption |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
2.6 Encryption |
Standard |
13.7 Network Attacks |
13.8 The CIA Triad |
Standard |
15.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
12.9 Common Security Problems |
Standard |
5.8 Application Security |
5.10 System Administration |
Standard |
1.2 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
1.8 Application Security |
1.9 System Administration |
2.8 Network Administration |
4.4 The CIA Triad |
Standard |
1.6 Common Security Problems |
Standard |
1.6 Common Security Problems |
Standard |
1.2 The CIA Triad |
1.12 Common Security Problems |
8.7 Network Attacks |
Standard |
1.6 Common Security Problems |
Standard |
1.2 The CIA Triad |
Standard |
8.4 The CIA Triad |
Standard |
11.3 The CIA Triad |
13.6 Application Security |
13.8 System Administration |
14.9 Common Security Problems |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
2.6 Encryption |
Standard |
1.4 The CIA Triad |
6.6 Application Security |
6.8 System Administration |
9.9 Common Security Problems |
Standard |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
3.6 Application Security |
3.8 System Administration |
Standard |
4.6 Application Security |
4.8 System Administration |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
16.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
6.9 Network Attacks |
6.10 Network Administration |
10.9 Common Security Problems |
Standard |
5.9 Network Attacks |
5.10 Network Administration |
Standard |
1.6 Application Security |
1.8 System Administration |
Standard |
3.6 Application Security |
3.8 System Administration |
Standard |
5.2 The CIA Triad |
Standard |
4.4 Cybersecurity |
4.5 The CIA Triad |
4.6 Encryption |
Standard |
1.2 The CIA Triad |
Standard |
4.6 Cybersecurity |
4.8 Encryption |
Standard |
4.6 Cybersecurity |
4.8 Encryption |
Standard |
4.8 Application Security |
4.10 System Administration |
Standard |
8.5 Application Security |
Standard |
4.8 Application Security |
4.10 System Administration |
Standard |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
10.8 Application Security |
10.10 System Administration |
Standard |
11.4 The CIA Triad |
Standard |
1.3 The CIA Triad |
Standard |
1.5 The CIA Triad |
7.6 Application Security |
7.8 System Administration |
17.9 Common Security Problems |
17.9 Common Security Problems |
Standard |
9.3 The CIA Triad |
9.4 System Administration |
Standard |
2.2 The CIA Triad |
Standard |
6.6 Application Security |
6.8 System Administration |
7.4 Common Security Problems |
Standard |
1.2 The CIA Triad |
Standard |
1.4 The CIA Triad |
4.6 Application Security |
4.8 System Administration |
5.10 Common Security Problems |
Standard |
1.2 The CIA Triad |
Standard |
13.4 The CIA Triad |
Standard |
4.4 Cybersecurity |
4.5 The CIA Triad |
4.6 Encryption |
Standard |
1.6 Application Security |
1.8 System Administration |
Standard |
1.4 The CIA Triad |
7.6 Application Security |
7.8 System Administration |
8.9 Common Security Problems |
Standard |
2.4 Cybersecurity |
2.5 The CIA Triad |
2.6 Encryption |
Standard |
13.4 The CIA Triad |
Standard |
1.2 The CIA Triad |
Standard |
4.6 Cybersecurity |
4.7 The CIA Triad |
4.8 Encryption |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company