Please enable JavaScript to use CodeHS

APCSP20: IOC-2.C.6

CodeHS Lessons

Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised.