Please enable JavaScript to use CodeHS

WA 3B: 3B-NI-04

CodeHS Lessons

Compare ways software developers protect devices and information from unauthorized access.

Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.8 Cybersecurity
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
Standard
41.1 Cryptography
31.1 Practice PT: Steganography
Standard
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.8 Packets & Protocols
9.8 Packets & Protocols
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
6.5 The CIA Triad
6.5 The CIA Triad
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
1.4 Digital Footprint and Reputation
Standard
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.4 The CIA Triad
15.4 The CIA Triad
Standard
13.8 The CIA Triad
13.6 Packets & Protocols
13.8 The CIA Triad
13.6 Packets & Protocols
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.11 Hacking Ethics
12.1 Inside Web Apps
12.2 Developer Tools
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
2.6 Packets & Protocols
2.6 Packets & Protocols
2.8 Network Administration
2.8 Network Administration
4.3 Hacking Ethics
4.3 Hacking Ethics
4.4 The CIA Triad
4.4 The CIA Triad
4.5 Privacy & Security
4.5 Privacy & Security
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
5.7 Packets & Protocols
5.7 Packets & Protocols
Standard
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
22.2 Developer Tools
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.2 History of Cryptography
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
22.2 Developer Tools
22.1 Inside Web Apps
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
21.2 History of Cryptography
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.4 The CIA Triad
8.4 The CIA Triad
Standard
11.3 The CIA Triad
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.1 Digital Footprint and Reputation
12.4 Privacy & Security
12.4 Privacy & Security
12.7 Hacking Ethics
12.7 Hacking Ethics
14.1 Inside Web Apps
14.1 Inside Web Apps
14.2 Developer Tools
14.2 Developer Tools
14.9 Common Security Problems
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
14.11 Types of SQLi and Prevention
15.8 Packets & Protocols
15.8 Packets & Protocols
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
9.1 Inside Web Apps
9.1 Inside Web Apps
9.2 Developer Tools
9.2 Developer Tools
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
22.1 Project: Public Service Announcement
21.7 Hacking Ethics
21.4 Privacy & Security
21.1 Digital Footprint and Reputation
24.8 Packets & Protocols
10.1 Project: Security Assessment Report
22.1 Project: Public Service Announcement
21.7 Hacking Ethics
21.4 Privacy & Security
10.1 Project: Security Assessment Report
24.8 Packets & Protocols
21.1 Digital Footprint and Reputation
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
16.4 The CIA Triad
8.1 Digital Footprint and Reputation
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.2 History of Cryptography
16.4 The CIA Triad
8.1 Digital Footprint and Reputation
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.2 History of Cryptography
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
1.4 Privacy & Security
1.7 Hacking Ethics
1.7 Hacking Ethics
2.1 Project: Public Service Announcement
2.1 Project: Public Service Announcement
6.6 Packets & Protocols
6.6 Packets & Protocols
6.10 Network Administration
6.10 Network Administration
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.1 Inside Web Apps
10.2 Developer Tools
10.2 Developer Tools
10.9 Common Security Problems
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
10.12 Cross-site Scripting
11.2 History of Cryptography
11.2 History of Cryptography
11.7 Advanced Cryptography
11.7 Advanced Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast
Standard
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.6 Packets & Protocols
5.6 Packets & Protocols
5.10 Network Administration
5.10 Network Administration
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
2.8 Packets & Protocols
Standard
2.1 Privacy & Security
2.1 Privacy & Security
7.8 Packets & Protocols
7.8 Packets & Protocols
Standard
5.2 The CIA Triad
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.3 Digital Footprint and Reputation
5.6 Privacy & Security
5.6 Privacy & Security
5.13 Hacking Ethics
5.13 Hacking Ethics
5.14 Project: Public Service Announcement
5.14 Project: Public Service Announcement
Standard
4.5 The CIA Triad
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
5.7 Privacy & Security
5.7 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
11.4 The CIA Triad
11.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
Standard
1.3 The CIA Triad
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.7 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.5 The CIA Triad
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
10.8 Packets & Protocols
10.8 Packets & Protocols
13.2 Assessing Risks
17.1 Inside Web Apps
17.1 Inside Web Apps
17.2 Developer Tools
17.2 Developer Tools
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
Standard
7.9 Cybersecurity
9.3 The CIA Triad
9.3 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.1 Digital Footprint and Reputation
1.5 Project: Public Service Announcement
1.5 Project: Public Service Announcement
2.2 The CIA Triad
2.2 The CIA Triad
2.4 Hacking Ethics
2.4 Hacking Ethics
Standard
10.1 Digital Footprint and Reputation
10.4 Privacy & Security
10.7 Project: Public Service Announcement
15.4 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.7 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
8.8 Packets & Protocols
13.5 Cross-site Scripting
15.2 Assessing Risks
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
1.8 Hacking Ethics
1.8 Hacking Ethics
Standard
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 Inside Web Apps
5.2 Inside Web Apps
5.3 Developer Tools
5.3 Developer Tools
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
8.2 History of Cryptography
8.2 History of Cryptography
9.8 Packets & Protocols
9.8 Packets & Protocols
13.2 Assessing Risks
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
5.6 Cybersecurity
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
Standard
4.5 The CIA Triad
4.5 The CIA Triad
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
2.8 Packets & Protocols
2.8 Packets & Protocols
Standard
7.8 Cryptography
10.9 Cybersecurity
Standard
3.2 The CIA Triad
3.2 The CIA Triad
3.3 Digital Footprint and Reputation
3.3 Digital Footprint and Reputation
3.6 Privacy & Security
3.6 Privacy & Security
3.11 Hacking Ethics
3.11 Hacking Ethics
3.12 Project: Public Service Announcement
3.12 Project: Public Service Announcement