Please enable JavaScript to use CodeHS

SC 9-12: HS3.NI.2.2

CodeHS Lessons

Evaluate various security measures, considering tradeoffs between the usability and security of a computing system. (e.g., a web filter that prevents access to many educational sites but keeps a campus’ network safe) (CSTA, 2017).

Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.8 Network Communication
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
5.12 Network Communication
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.7 Browser Configuration
13.8 System Administration
Standard
2.10 System Administration
3.9 Network Communication
Standard
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
Standard
4.7 Browser Configuration
4.8 System Administration
6.6 Network Communication
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
2.1 Privacy & Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.9 Browser Configuration
10.10 System Administration
12.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
Standard
8.4 System Administration
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
3.8 Browser Configuration
3.9 System Administration
5.10 Network Communication
7.8 Risk Response
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
2.4 Privacy & Security
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.9 Browser Configuration
2.10 System Administration
4.10 Network Communication
Standard
9.4 System Administration