Please enable JavaScript to use CodeHS

NCMF: 5.4.1c

CodeHS Lessons

Software vulnerabilities examples that resulted in a loss of integrity such as man in the middle attacks (many examples), compromise industrial control systems (i.e. Stuxnet), vehicle control systems (Jeep Cherokee hack), and medical devices (Medtronic infusion pumps).

Standard
8.2 Assessing Risks
Standard
12.2 Assessing Risks
Standard
13.2 Assessing Risks
Standard
15.2 Assessing Risks
Standard
13.2 Assessing Risks