- What is CodeHS?
 - Curriculum
 - Platform
 - Assignments
 - Classroom Management
 - Grading
 - Gradebook
 - Progress Tracking
 - Lesson Plans
 - Offline Handouts
 - Problem Guides
 - Practice
 - Create
 - Problem Bank
 - Playlist Bank
 - Quiz Scores
 - Rostering
 - Integrations
 - Professional Development
 - Stories
 - Standards
 - States
 - Alabama
 - Alaska
 - Arizona
 - Arkansas
 - California
 - Colorado
 - Connecticut
 - D.C.
 - Delaware
 - Florida
 - Georgia
 - Hawaii
 - Idaho
 - Illinois
 - Indiana
 - Iowa
 - Kansas
 - Kentucky
 - Louisiana
 - Maine
 - Maryland
 - Massachusetts
 - Michigan
 - Minnesota
 - Mississippi
 - Missouri
 - Montana
 - Nebraska
 - Nevada
 - New Hampshire
 - New Jersey
 - New Mexico
 - New York
 - North Carolina
 - North Dakota
 - Ohio
 - Oklahoma
 - Oregon
 - Pennsylvania
 - Rhode Island
 - South Carolina
 - South Dakota
 - Tennessee
 - Texas
 - Utah
 - Vermont
 - Virginia
 - Washington
 - West Virginia
 - Wisconsin
 - Wyoming
 - State Standards
 - Plans
 - Resources
 - Districts
 - Share
 - Contact Us
 - Company
 
    
    FL 9-12: SC.912.CS-PC.1.6
CodeHS Lessons
Describe computer security vulnerabilities and methods of attack, and evaluate their social and economic impact on computer systems and people.
| Standard | 
| 8.10 Cryptography | 
| Standard | 
| 8.10 Cryptography | 
| Standard | 
| 7.8 Cryptography | 
| Standard | 
| 4.8 Application Security | 
| Standard | 
| 3.1 Network Attacks | 
| 3.2 Malware Types and Prevention | 
| 3.4 Additional Attacks | 
| 3.6 Internal Threats | 
| 9.2 Assessing Risks | 
| Standard | 
| 41.1 Cryptography | 
| Standard | 
| 13.7 Network Attacks | 
| 13.9 Impact of Cybersecurity | 
| 13.1 What is Cybersecurity? | 
| Standard | 
| 9.3 Internet Safety | 
| 9.4 Privacy & Security | 
| 15.3 Impact of Cybersecurity | 
| 15.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.2 Impact of Cybersecurity | 
| 1.6 Internet Safety | 
| 1.7 Privacy & Security | 
| 12.9 Common Security Problems | 
| 12.11 Types of SQLi and Prevention | 
| Standard | 
| 5.8 Application Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 11.6 Application Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 7.8 Common Security Problems | 
| 7.10 Types of SQLi and Prevention | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 2.8 Application Security | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.9 Application Security | 
| 1.12 Internal Threats | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.8 Application Security | 
| 2.8 Network Administration | 
| 4.1 What is Cybersecurity? | 
| 4.2 Impact of Cybersecurity | 
| 4.5 Privacy & Security | 
| Standard | 
| 1.3 Privacy & Security | 
| 1.6 Common Security Problems | 
| Standard | 
| 1.3 Privacy & Security | 
| 1.6 Common Security Problems | 
| 8.2 Impact of Cybersecurity | 
| 8.3 Network Attacks | 
| 8.4 Malware Types and Prevention | 
| 8.6 Additional Attacks | 
| 8.7 Internal Threats | 
| Standard | 
| 8.10 Cryptography | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| 1.12 Common Security Problems | 
| 8.7 Network Attacks | 
| 22.10 Types of SQLi and Prevention | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 8.3 Impact of Cybersecurity | 
| 8.2 What is Cybersecurity? | 
| Standard | 
| 11.1 What is Cybersecurity? | 
| 11.2 Impact of Cybersecurity | 
| 12.3 Internet Safety | 
| 12.4 Privacy & Security | 
| 13.6 Application Security | 
| 14.9 Common Security Problems | 
| 14.11 Types of SQLi and Prevention | 
| Standard | 
| 2.9 Application Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 6.6 Application Security | 
| 9.9 Common Security Problems | 
| 9.11 Types of SQLi and Prevention | 
| 12.2 Assessing Risks | 
| 21.3 Internet Safety | 
| 21.4 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 3.6 Application Security | 
| Standard | 
| 4.5 Application Security | 
| Standard | 
| 4.6 Application Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 7.7 Cryptography | 
| Standard | 
| 7.7 Cryptography | 
| Standard | 
| 8.3 Internet Safety | 
| 8.4 Privacy & Security | 
| 16.3 Impact of Cybersecurity | 
| 16.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 1.3 Internet Safety | 
| 1.4 Privacy & Security | 
| 6.9 Network Attacks | 
| 6.10 Network Administration | 
| 10.9 Common Security Problems | 
| 10.11 Types of SQLi and Prevention | 
| Standard | 
| 2.3 Internet Safety | 
| 2.4 Privacy & Security | 
| 5.9 Network Attacks | 
| 5.10 Network Administration | 
| Standard | 
| 1.6 Application Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 2.1 Privacy & Security | 
| 3.6 Application Security | 
| Standard | 
| 5.1 What is Cybersecurity? | 
| 5.5 Internet Safety | 
| 5.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.8 Application Security | 
| Standard | 
| 6.10 Cryptography | 
| 8.5 Application Security | 
| Standard | 
| 4.8 Application Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 10.8 Application Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 11.2 What is Cybersecurity? | 
| 11.3 Impact of Cybersecurity | 
| Standard | 
| 1.3 Internet Safety | 
| 1.4 Privacy & Security | 
| Standard | 
| 1.3 Internet Safety | 
| 1.4 Privacy & Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.6 Internet Safety | 
| 1.7 Privacy & Security | 
| Standard | 
| 1.3 What is Cybersecurity? | 
| 1.4 Impact of Cybersecurity | 
| 2.3 Internet Safety | 
| 2.4 Privacy & Security | 
| 7.6 Application Security | 
| 8.1 Network Attacks | 
| 8.2 Malware Types and Prevention | 
| 17.9 Common Security Problems | 
| 17.9 Common Security Problems | 
| 17.11 Types of SQLi and Prevention | 
| 17.11 Types of SQLi and Prevention | 
| 13.2 Assessing Risks | 
| Standard | 
| 8.1 What is Cybersecurity? | 
| 8.2 Impact of Cybersecurity | 
| Standard | 
| 5.8 Application Security | 
| Standard | 
| 3.6 Application Security | 
| Standard | 
| 1.3 Internet Safety | 
| 2.1 What is Cybersecurity? | 
| Standard | 
| 10.3 Internet Safety | 
| 10.4 Privacy & Security | 
| 15.2 What is Cybersecurity? | 
| 15.3 Impact of Cybersecurity | 
| Standard | 
| 1.6 Application Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.5 Privacy & Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 2.3 Internet Safety | 
| 2.4 Privacy & Security | 
| 6.6 Application Security | 
| 7.4 Common Security Problems | 
| 7.6 Types of SQLi and Prevention | 
| 13.1 Network Attacks | 
| 13.2 Malware Types and Prevention | 
| 13.4 Additional Attacks | 
| 13.6 Internal Threats | 
| 15.2 Assessing Risks | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.3 Privacy & Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 2.3 Internet Safety | 
| 2.4 Privacy & Security | 
| 4.6 Application Security | 
| 5.10 Common Security Problems | 
| 5.12 Types of SQLi and Prevention | 
| 13.2 Assessing Risks | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.5 Internet Safety | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.3 Internet Safety | 
| 4.4 Privacy & Security | 
| 13.3 Impact of Cybersecurity | 
| 13.2 What is Cybersecurity? | 
| Standard | 
| 9.1 What is Cybersecurity? | 
| 9.2 Impact of Cybersecurity | 
| Standard | 
| 5.7 Privacy & Security | 
| Standard | 
| 3.3 Internet Safety | 
| 3.4 Privacy & Security | 
- What is CodeHS?
 - Curriculum
 - Platform
 - Assignments
 - Classroom Management
 - Grading
 - Gradebook
 - Progress Tracking
 - Lesson Plans
 - Offline Handouts
 - Problem Guides
 - Practice
 - Create
 - Problem Bank
 - Playlist Bank
 - Quiz Scores
 - Rostering
 - Integrations
 - Professional Development
 - Stories
 - Standards
 - States
 - Alabama
 - Alaska
 - Arizona
 - Arkansas
 - California
 - Colorado
 - Connecticut
 - D.C.
 - Delaware
 - Florida
 - Georgia
 - Hawaii
 - Idaho
 - Illinois
 - Indiana
 - Iowa
 - Kansas
 - Kentucky
 - Louisiana
 - Maine
 - Maryland
 - Massachusetts
 - Michigan
 - Minnesota
 - Mississippi
 - Missouri
 - Montana
 - Nebraska
 - Nevada
 - New Hampshire
 - New Jersey
 - New Mexico
 - New York
 - North Carolina
 - North Dakota
 - Ohio
 - Oklahoma
 - Oregon
 - Pennsylvania
 - Rhode Island
 - South Carolina
 - South Dakota
 - Tennessee
 - Texas
 - Utah
 - Vermont
 - Virginia
 - Washington
 - West Virginia
 - Wisconsin
 - Wyoming
 - State Standards
 - Plans
 - Resources
 - Districts
 - Share
 - Contact Us
 - Company