Please enable JavaScript to use CodeHS

Indiana Principles of Computing

Lesson 3.8 Assessing Risk

Activities

These are all the activities included in the lesson

3.8.1 Assessing Risks
3.8.2 Malware Risk Assessment
3.8.3 Poor Password Assessment
3.8.4 Social Engineering Assessment
3.8.5 Assessing Risks
3.8.6 Assessing Risks Quiz
3.8.7 End-of-Life OS
3.8.8 End-of-Life Proposal
3.8.9 Input Handling
3.8.10 Input Handling Responses
3.8.11 Input Validation
3.8.12 Input Validation Responses
3.8.13 Risk Management Quiz