Please enable JavaScript to use CodeHS

WI 9-12: NI1.a.7.h

CodeHS Lessons

(+) Explain security issues that might lead to compromised computer programs (e.g., circular references, ambiguous program calls, lack of error checking, and field size checking).

Standard
8.9 Common Security Problems
8.10 SQL Injection Overview
Standard
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
13.7 Network Attacks
Standard
11.9 Common Security Problems
11.10 SQL Injection Overview
Standard
1.6 Common Security Problems
Standard
1.6 Common Security Problems
Standard
1.12 Common Security Problems
8.7 Network Attacks
22.9 SQL Injection Overview
22.11 Cross-site Scripting
Standard
14.9 Common Security Problems
14.10 SQL Injection Overview
Standard
9.9 Common Security Problems
9.10 SQL Injection Overview
12.2 Assessing Risks
Standard
6.9 Network Attacks
10.9 Common Security Problems
10.10 SQL Injection Overview
10.12 Cross-site Scripting
Standard
5.9 Network Attacks
Standard
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
13.2 Assessing Risks
Standard
7.4 Common Security Problems
7.5 SQL Injection Overview
13.5 Cross-site Scripting
15.2 Assessing Risks
Standard
5.10 Common Security Problems
5.11 SQL Injection Overview
13.2 Assessing Risks