Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 28

CodeHS Lessons

Research and describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc. Investigate and distinguish among the following common prevention methods to secure a computer system. For a given scenario, identify the most applicable best practice to secure a workstation as well as describe methods for data destruction and disposal. Implement these practices and write a justification for each scenario solution. Provide supporting evidence for each solution, drawing on technical texts and industry standards. Prevention methods include: a. Physical security (e.g., lock doors, tailgating, biometrics, badges, key fobs, retinal, etc.) b. Digital security (e.g., antivirus, firewalls, antispyware, user authentication, etc.) c. User education d. Principles of least privilege

13.9 Impact of Cybersecurity
15.3 Impact of Cybersecurity
14.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity