Please enable JavaScript to use CodeHS

AK 6-8: 8.NI.C.01

CodeHS Lessons

Evaluate physical and digital procedures that could be implemented to protect electronic data/information. Explain the impacts of malware (e.g., hacking, ransomware).

Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
Standard
6.4 Cybersecurity
Standard
2.4 Cybersecurity
Standard
7.7 The Impact of the Internet
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
12.7 The Impact of the Internet
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
Standard
3.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
1.7 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.8 The Impact of the Internet
Standard
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.2 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.4 Privacy & Security
Standard
2.4 Cybersecurity
Standard
6.7 The Impact of the Internet
Standard
6.7 The Impact of the Internet
Standard
1.3 Impact of Cybersecurity
21.4 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
3.8 The Impact of the Internet
16.3 Impact of Cybersecurity
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
13.7 The Impact of the Internet
Standard
2.4 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.6 Privacy & Security
Standard
4.4 Cybersecurity
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
11.3 Impact of Cybersecurity
Standard
1.7 Privacy & Security
Standard
1.4 Impact of Cybersecurity
2.4 Privacy & Security
Standard
9.2 Impact of Cybersecurity
Standard
7.7 The Impact of the Internet
10.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
3.7 The Impact of the Internet
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
3.6 Privacy & Security