Please enable JavaScript to use CodeHS

CO 9-12: CS.HS.4.3b

CodeHS Lessons

Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why. (This covers “Demonstrate adversarial thinking for a given problem. example: attack trees”)

Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
1.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
1.7 Common Cyber Attacks and Prevention
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
5.7 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
6.6 Checking for Vulnerabilities
6.7 Risky Business
Standard
7.7 Risky Business