Please enable JavaScript to use CodeHS

SD CS Essentials: SD.CSE.2.4

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
4.8 Application Security
Standard
8.2 Assessing Risks
Standard
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
Standard
5.8 Application Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
12.3 Internet Safety
12.4 Privacy & Security
13.6 Application Security
Standard
6.6 Application Security
12.2 Assessing Risks
21.4 Privacy & Security
21.3 Internet Safety
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
8.4 Privacy & Security
8.3 Internet Safety
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
Standard
2.1 Privacy & Security
3.6 Application Security
Standard
5.5 Internet Safety
5.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.8 Application Security
Standard
6.10 Cryptography
7.9 Cybersecurity
8.5 Application Security
Standard
4.8 Application Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
13.2 Assessing Risks
Standard
7.9 Cybersecurity
Standard
10.3 Internet Safety
10.4 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
6.6 Application Security
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
4.6 Application Security
13.2 Assessing Risks
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
Standard
7.8 Cryptography
10.9 Cybersecurity
Standard
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security