Please enable JavaScript to use CodeHS

RI 9-12: 3-CY-R-2

CodeHS Lessons

Analyze an existing or proposed application to identify the potential ways it could be used to obtain sensitive information.

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.8 Cybersecurity
12.1 The Effects of the Internet
Standard
11.9 Cybersecurity
Standard
32.1 The Effects of the Internet
Standard
5.3 Creating Your Data Collection Website
5.5 Analyzing User Data
Standard
6.1 Project Security Assessment Report
Standard
5.13 Ethical Issues Around Data Collection
Standard
9.13 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
12.1 The Effects of the Internet
Standard
3.3 Personal Data and Collection
3.7 Cybersecurity Essentials
Standard
1.2 Personal Data and Collection
1.6 Cybersecurity Essentials
Standard
8.10 Cybersecurity
Standard
7.13 Ethical Issues Around Data Collection
Standard
5.2 Personal Data and Collection
5.6 Cybersecurity Essentials
Standard
7.9 Cybersecurity
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection
Standard
4.2 Personal Data and Collection
4.6 Cybersecurity Essentials
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
7.13 Ethical Issues Around Data Collection
Standard
10.9 Cybersecurity