Please enable JavaScript to use CodeHS

Indiana Principles of Computing

Lesson 3.7 Identifying Risks

Description


Objective


Activities

These are all the activities included in the lesson

3.7.1 Identifying Risks
3.7.2 Identifying Risks Quiz
3.7.3 What is a Honeypot?
3.7.4 Honeypot Attacks
3.7.5 Honeypot Attacks
3.7.6 Whois
3.7.7 Packet Sniffing
3.7.8 Packet Sniffing Response
3.7.9 Breach Trends