Please enable JavaScript to use CodeHS

WI 9-12: NI1.a.6.h

CodeHS Lessons

Provide examples of personal data that should be kept secure and the methods by which individuals keep their private data secure.

Standard
7.7 Ethical Issues Around Data Collection
Standard
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
7.4 Level 4: Data and Licenses
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.7 Privacy & Security
Standard
9.13 Ethical Issues Around Data Collection
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.8 Network Administration
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
12.4 Privacy & Security
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.4 Privacy & Security
6.10 Network Administration
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
5.10 Network Administration
Standard
7.13 Ethical Issues Around Data Collection
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
19.4 Level 4: Data and Licenses
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
14.4 Level 4: Data and Licenses
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
7.4 Level 4: Data and Licenses
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
14.7 Ethical Issues Around Data Collection
Standard
13.7 Ethical Issues Around Data Collection
Standard
7.13 Ethical Issues Around Data Collection
Standard
3.6 Privacy & Security