Please enable JavaScript to use CodeHS

MS 11-12: AP.3B.11

CodeHS Lessons

Explain security issues that might lead to compromised computer programs

Standard
8.10 Cryptography
11.8 Cybersecurity
11.9 The Impact of the Internet
Standard
13.9 The Impact of the Internet
41.1 Cryptography
Standard
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
1.7 Digital Certificates
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
5.6 Internal Threats
Standard
2.5 Future of Computing
7.7 The Impact of the Internet
9.4 Privacy & Security
Standard
12.7 The Impact of the Internet
10.5 Future of Computing
Standard
12.7 The Impact of the Internet
10.5 Future of Computing
13.7 Network Attacks
Standard
3.7 The Impact of the Internet
Standard
2.5 Future of Computing
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.7 Privacy & Security
11.9 Common Security Problems
11.11 Types of SQLi and Prevention
Standard
6.8 Application Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
12.2 Future of Computing
Standard
1.6 Privacy & Security
14.2 Future of Computing
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
4.5 Future of Computing
Standard
1.5 Future of Computing
1.8 The Impact of the Internet
Standard
1.8 Application Security
2.8 Network Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
4.6 Future of Computing
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
8.7 Internal Threats
Standard
8.10 Cryptography
11.9 Cybersecurity
11.10 The Impact of the Internet
Standard
1.6 Privacy & Security
1.12 Common Security Problems
4.5 Future of Computing
8.7 Network Attacks
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.6 Application Security
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
Standard
4.5 Future of Computing
6.7 The Impact of the Internet
Standard
4.7 Digital Certificates
6.6 Application Security
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
2.4 Authentication Methods
3.6 Application Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
7.7 Cryptography
8.10 Cybersecurity
8.11 The Impact of the Internet
Standard
3.8 The Impact of the Internet
9.5 Future of Computing
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.4 Privacy & Security
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
13.7 The Impact of the Internet
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Network Administration
Standard
1.6 Application Security
Standard
2.1 Privacy & Security
3.6 Application Security
Standard
1.5 Future of Computing
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
2.5 Future of Computing
Standard
2.4 Privacy & Security
5.7 Digital Certificates
7.6 Application Security
8.1 Network Attacks
8.2 Malware Types and Prevention
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
Standard
2.6 Future of Computing
7.9 Cybersecurity
7.10 The Impact of the Internet
Standard
1.8 Future of Computing
Standard
4.6 Future of Computing
7.7 The Impact of the Internet
10.4 Privacy & Security
Standard
1.8 Future of Computing
4.4 Privacy & Security
Standard
1.5 Privacy & Security
3.7 The Impact of the Internet
7.8 Future of Computing
Standard
2.4 Privacy & Security
4.8 Digital Certificates
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
13.6 Internal Threats
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.6 Application Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
Standard
1.6 Privacy & Security
Standard
2.5 Future of Computing
4.4 Privacy & Security
9.7 The Impact of the Internet
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
Standard
1.6 Application Security
Standard
3.6 Privacy & Security