Please enable JavaScript to use CodeHS

AK 9-12: L1.NI.C.01

CodeHS Lessons

Compare various security measures by evaluating tradeoffs between the usability and security of a computing system.

Standard
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Standard
1.5 Digital Certificates
3.1 Network Attacks
6.5 Access Control
9.2 Assessing Risks
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.8 Application Security
5.9 Browser Configuration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
8.3 Network Attacks
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
13.7 Browser Configuration
Standard
2.9 Application Security
Standard
4.7 Digital Certificates
6.6 Application Security
6.7 Browser Configuration
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
2.4 Authentication Methods
3.6 Application Security
3.7 Browser Configuration
Standard
2.4 Authentication Methods
4.6 Application Security
4.7 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.6 Application Security
1.7 Browser Configuration
Standard
2.1 Privacy & Security
3.6 Application Security
3.7 Browser Configuration
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Standard
8.5 Application Security
Standard
2.4 Authentication Methods
4.8 Application Security
4.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.8 Application Security
10.9 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
5.7 Digital Certificates
7.6 Application Security
7.7 Browser Configuration
18.6 Access Control
18.6 Access Control
8.1 Network Attacks
13.2 Assessing Risks
Standard
5.8 Application Security
5.9 Browser Configuration
Standard
2.4 Authentication Methods
3.6 Application Security
3.8 Browser Configuration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.8 Digital Certificates
6.6 Application Security
6.7 Browser Configuration
8.11 Access Control
13.1 Network Attacks
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
4.7 Browser Configuration
13.2 Assessing Risks
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.6 Application Security
1.7 Browser Configuration
Standard
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.8 Application Security
2.9 Browser Configuration
Standard
1.7 Digital Certificates
3.6 Access Control
5.1 Network Attacks
8.2 Assessing Risks