Please enable JavaScript to use CodeHS

AK 6-8: 6.NI.C.01

CodeHS Lessons

Identify existing cybersecurity concerns with the Internet and systems it uses.

Standard
6.4 Cybersecurity
6.5 The CIA Triad
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.5 Future of Computing
13.8 The CIA Triad
Standard
2.5 Future of Computing
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
2.5 Future of Computing
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 Impact of Cybersecurity
1.7 Privacy & Security
12.10 SQL Injection Overview
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
12.2 Future of Computing
Standard
1.2 The CIA Triad
1.6 Privacy & Security
14.2 Future of Computing
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
4.5 Future of Computing
Standard
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
4.2 Impact of Cybersecurity
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.3 Privacy & Security
4.6 Future of Computing
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
Standard
1.2 The CIA Triad
1.6 Privacy & Security
4.5 Future of Computing
22.9 SQL Injection Overview
Standard
1.3 Privacy & Security
4.6 Future of Computing
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
8.3 Impact of Cybersecurity
8.4 The CIA Triad
Standard
11.2 Impact of Cybersecurity
11.3 The CIA Triad
12.4 Privacy & Security
14.10 SQL Injection Overview
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
9.10 SQL Injection Overview
21.4 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
3.8 The Impact of the Internet
8.4 Privacy & Security
16.3 Impact of Cybersecurity
9.5 Future of Computing
16.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.4 Privacy & Security
10.10 SQL Injection Overview
13.7 The Impact of the Internet
14.1 Project: The Effects of the Internet
Standard
2.4 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
1.5 Future of Computing
5.2 The CIA Triad
5.6 Privacy & Security
Standard
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.6 Cybersecurity
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
11.3 Impact of Cybersecurity
11.4 The CIA Triad
Standard
1.3 The CIA Triad
1.7 Privacy & Security
2.5 Future of Computing
Standard
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.4 Privacy & Security
17.10 SQL Injection Overview
17.10 SQL Injection Overview
Standard
2.6 Future of Computing
9.2 Impact of Cybersecurity
9.3 The CIA Triad
Standard
1.8 Future of Computing
2.2 The CIA Triad
Standard
4.6 Future of Computing
7.7 The Impact of the Internet
10.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.8 Future of Computing
4.4 Privacy & Security
Standard
1.5 Privacy & Security
3.7 The Impact of the Internet
7.8 Future of Computing
13.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.5 SQL Injection Overview
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
5.11 SQL Injection Overview
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
8.10 SQL Injection Overview
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security