Please enable JavaScript to use CodeHS

OK 6-8: 8.IC.SLE.01

CodeHS Lessons

Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
6.4 Cybersecurity
6.5 The CIA Triad
7.7 Hacking Ethics
Standard
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
11.3 The CIA Triad
12.4 Privacy & Security
12.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
8.4 Privacy & Security
16.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
1.7 Hacking Ethics
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
11.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.3 The CIA Triad
Standard
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.4 Hacking Ethics
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
4.4 Cybersecurity
4.5 The CIA Triad
6.7 Hacking Ethics
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
3.6 Privacy & Security
3.11 Hacking Ethics
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
2.7 Hacking Ethics