Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.4.1b

CodeHS Lessons

Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why.

Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
1.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
10.6 Checking for Vulnerabilities
10.7 Risky Business
Standard
1.7 Common Cyber Attacks and Prevention
11.6 Checking for Vulnerabilities
11.7 Risky Business
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
5.7 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
7.7 Risky Business
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
6.6 Checking for Vulnerabilities
6.7 Risky Business
Standard
3.7 Common Cyber Attacks and Prevention