Please enable JavaScript to use CodeHS

FL CSD: CS-PC.1.6

CodeHS Lessons

Describe computer security vulnerabilities and methods of attack, and evaluate their social and economic impact on computer systems and people.

Standard
5.1 Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.4 The CIA Triad
15.3 Impact of Cybersecurity
Standard
13.1 What is Cybersecurity?
13.8 The CIA Triad
13.9 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.3 The CIA Triad
1.7 Privacy & Security
1.11 Hacking Ethics
12.9 Common Security Problems
12.10 SQL Injection Overview
12.11 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.12 Hacking Ethics
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.6 Additional Attacks
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Common Security Problems
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.4 The CIA Triad
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
11.3 The CIA Triad
12.4 Privacy & Security
12.7 Hacking Ethics
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
2.5 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.4 Privacy & Security
21.7 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
8.4 Privacy & Security
16.2 What is Cybersecurity?
16.4 The CIA Triad
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
1.7 Hacking Ethics
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
2.7 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.6 Privacy & Security
5.13 Hacking Ethics
Standard
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
11.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.7 Privacy & Security
1.12 Hacking Ethics
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
8.1 Network Attacks
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.3 The CIA Triad
Standard
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.4 Hacking Ethics
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
13.1 Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
15.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.6 Privacy & Security
1.11 Hacking Ethics
Standard
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.4 The CIA Triad
13.3 Impact of Cybersecurity
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.4 Privacy & Security
2.7 Hacking Ethics
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention