Please enable JavaScript to use CodeHS

CSTA 3A: 3A-IC-30

CodeHS Lessons

Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.

Standard
11.8 Cybersecurity
12.1 The Effects of the Internet
13.3 Data Collection & Limitations
Standard
11.9 Cybersecurity
12.1 The Effects of the Internet
13.3 Data Collection & Limitations
Standard
16.3 Data Collection & Limitations
32.1 The Effects of the Internet
Standard
4.1 Collecting and Storing Data
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
9.10 Impact of the Internet
14.1 Project: Security Assessment Report
Standard
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
1.4 Digital Footprint and Reputation
Standard
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.4 Privacy & Security
10.1 Project: Public Service Announcement
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 Impact of Cybersecurity
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
9.1 Collecting and Storing Data
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
1.7 The Impact of the Internet
6.8 Application Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
4.12 The Impact of the Internet
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
3.12 The Impact of the Internet
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
2.2 History of Cryptography
5.7 The Impact of the Internet
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
5.8 The Impact of the Internet
Standard
1.8 Application Security
2.7 Impact of the Internet
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
5.1 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
4.5 Impact of the Internet
11.4 Collecting and Storing Data
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
5.2 Impact of the Internet
8.2 Impact of Cybersecurity
Standard
11.9 Cybersecurity
12.1 The Effects of the Internet
13.3 Data Collection & Limitations
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Common Security Problems
1.13 Project: Public Service Announcement
8.8 The Impact of the Internet
21.2 History of Cryptography
21.3 Why encrypt?
21.10 Project: Classic Cipher Newscast
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
8.1 Collecting and Storing Data
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
8.3 Impact of Cybersecurity
8.4 The CIA Triad
Standard
9.3 Data Collection & Limitations
11.2 Impact of Cybersecurity
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.3 Internet Safety
12.4 Privacy & Security
12.7 Hacking Ethics
13.6 Application Security
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
15.10 Impact of the Internet
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
6.6 Application Security
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
10.1 Project: Security Assessment Report
24.10 Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
8.10 Cybersecurity
10.3 Data Collection & Limitations
Standard
8.10 Cybersecurity
10.3 Data Collection & Limitations
Standard
16.3 Impact of Cybersecurity
16.4 The CIA Triad
8.1 Digital Footprint and Reputation
8.3 Internet Safety
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.2 History of Cryptography
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
1.7 Hacking Ethics
2.1 Project: Public Service Announcement
6.8 Impact of the Internet
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
11.2 History of Cryptography
12.1 Project: Classic Cipher Newscast
Standard
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
2.11 Impact of the Internet
Standard
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.6 Application Security
7.11 Impact of the Internet
Standard
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.5 Internet Safety
5.6 Privacy & Security
5.10 Data Collection & Limitations
5.13 Hacking Ethics
5.14 Project: Public Service Announcement
8.7 The Impact of the Internet
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
3.7 The Impact of the Internet
Standard
5.7 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
7.3 Data Collection & Limitations
10.8 Application Security
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
11.3 Impact of Cybersecurity
11.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
1.10 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
5.7 The Impact of the Internet
Standard
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.2 History of Cryptography
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
10.10 Impact of the Internet
13.2 Assessing Risks
9.1 Project: Security Assessment Report
Standard
7.9 Cybersecurity
9.2 Impact of Cybersecurity
9.3 The CIA Triad
10.3 Data Collection & Limitations
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.5 Project: Public Service Announcement
2.2 The CIA Triad
2.4 Hacking Ethics
3.5 Data Collection & Limitations
Standard
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
10.7 Project: Public Service Announcement
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.7 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
12.1 Project: Public Service Announcement
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.12 Impact of the Internet
13.5 Cross-site Scripting
15.2 Assessing Risks
Standard
1.2 The CIA Triad
1.3 Privacy & Security
1.8 Hacking Ethics
4.7 The Impact of the Internet
Standard
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
8.2 History of Cryptography
9.10 Impact of the Internet
13.2 Assessing Risks
6.1 Project: Security Assessment Report
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
5.6 Cybersecurity
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
10.1 Collecting and Storing Data
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
4.1 Collecting and Storing Data
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
9.1 Collecting and Storing Data
Standard
1.6 Application Security
2.11 Impact of the Internet
Standard
10.9 Cybersecurity
11.1 The Effects of the Internet
12.3 Data Collection & Limitations
Standard
3.2 The CIA Triad
3.3 Digital Footprint and Reputation
3.5 Internet Safety
3.6 Privacy & Security
3.9 Data Collection & Limitations
3.11 Hacking Ethics
3.12 Project: Public Service Announcement
4.7 The Impact of the Internet
Standard
2.5 The CIA Triad