Please enable JavaScript to use CodeHS

NH 2: 2-NI-05

CodeHS Lessons

Explain how physical and digital security measures protect electronic information.

Standard
4.8 Application Security
8.5 Environmental Controls
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
3.1 Network Administrator
3.2 Environmental Controls
5.5 Cross-site Scripting
5.5 Cross-site Scripting
Standard
6.4 Cybersecurity
6.6 Encryption
7.4 Privacy & Security
Standard
5.4 Privacy & Security
Standard
2.4 Cybersecurity
2.6 Encryption
Standard
13.5 Routing
13.6 Packets & Protocols
13.5 Routing
13.6 Packets & Protocols
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
Standard
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
1.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.6 Internet Safety
1.7 Privacy & Security
1.11 Hacking Ethics
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
5.8 Application Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.8 Application Security
2.5 Routing
2.5 Routing
2.6 Packets & Protocols
2.6 Packets & Protocols
2.8 Network Administration
2.8 Network Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.3 Hacking Ethics
4.5 Privacy & Security
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
5.6 Routing
5.6 Routing
5.7 Packets & Protocols
5.7 Packets & Protocols
5.9 Viewing a Webpage
5.9 Viewing a Webpage
5.11 Network Administrator
6.9 Environmental Controls
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.1 Cryptography, Cryptology, Cryptanalysis
21.1 Cryptography, Cryptology, Cryptanalysis
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
21.2 History of Cryptography
21.7 Advanced Cryptography
21.2 History of Cryptography
21.3 Why encrypt?
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.3 Internet Safety
12.3 Internet Safety
12.4 Privacy & Security
12.4 Privacy & Security
12.7 Hacking Ethics
12.7 Hacking Ethics
13.6 Application Security
14.9 Common Security Problems
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
14.11 Types of SQLi and Prevention
15.7 Routing
15.7 Routing
15.8 Packets & Protocols
15.8 Packets & Protocols
15.9 Viewing a Webpage
15.9 Viewing a Webpage
Standard
2.4 Cybersecurity
2.6 Encryption
Standard
2.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
24.9 Viewing a Webpage
24.8 Packets & Protocols
24.7 Routing
10.1 Project: Security Assessment Report
21.4 Privacy & Security
22.1 Project: Public Service Announcement
21.7 Hacking Ethics
21.3 Internet Safety
21.3 Internet Safety
24.9 Viewing a Webpage
24.8 Packets & Protocols
24.7 Routing
10.1 Project: Security Assessment Report
22.1 Project: Public Service Announcement
21.7 Hacking Ethics
21.4 Privacy & Security
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
2.3 Asymmetric Encryption
3.6 Application Security
Standard
2.3 Asymmetric Encryption
4.6 Application Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
8.3 Internet Safety
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
8.3 Internet Safety
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.3 Internet Safety
1.3 Internet Safety
1.4 Privacy & Security
1.4 Privacy & Security
1.7 Hacking Ethics
1.7 Hacking Ethics
2.1 Project: Public Service Announcement
2.1 Project: Public Service Announcement
6.5 Routing
6.5 Routing
6.6 Packets & Protocols
6.6 Packets & Protocols
6.7 Viewing a Webpage
6.7 Viewing a Webpage
6.10 Network Administration
6.10 Network Administration
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
10.12 Cross-site Scripting
11.1 Cryptography, Cryptology, Cryptanalysis
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
11.2 History of Cryptography
11.7 Advanced Cryptography
11.7 Advanced Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.5 Routing
5.5 Routing
5.6 Packets & Protocols
5.6 Packets & Protocols
5.7 Viewing a Webpage
5.7 Viewing a Webpage
5.10 Network Administration
5.10 Network Administration
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
2.7 Routing
2.8 Packets & Protocols
2.9 Viewing a Webpage
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 Environmental Controls
2.1 Privacy & Security
2.1 Privacy & Security
3.6 Application Security
4.8 Network Administrator
7.7 Routing
7.7 Routing
7.8 Packets & Protocols
7.8 Packets & Protocols
7.10 Viewing a Webpage
7.10 Viewing a Webpage
Standard
5.1 What is Cybersecurity?
5.5 Internet Safety
5.5 Internet Safety
5.6 Privacy & Security
5.6 Privacy & Security
5.13 Hacking Ethics
5.13 Hacking Ethics
5.14 Project: Public Service Announcement
5.14 Project: Public Service Announcement
Standard
1.4 Privacy & Security
4.4 Cybersecurity
4.6 Encryption
Standard
5.7 Privacy & Security
5.7 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.6 Cybersecurity
4.8 Encryption
5.4 Privacy & Security
Standard
4.6 Cybersecurity
4.8 Encryption
5.4 Privacy & Security
Standard
2.3 Asymmetric Encryption
4.8 Application Security
8.5 Environmental Controls
Standard
8.5 Application Security
Standard
2.3 Asymmetric Encryption
4.8 Application Security
8.5 Environmental Controls
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
10.8 Application Security
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
10.7 Routing
10.7 Routing
10.8 Packets & Protocols
10.8 Packets & Protocols
10.9 Viewing a Webpage
10.9 Viewing a Webpage
9.1 Project: Security Assessment Report
18.2 Environmental Controls
18.1 Network Administrator
9.1 Project: Security Assessment Report
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
1.3 Internet Safety
1.3 Internet Safety
1.5 Project: Public Service Announcement
1.5 Project: Public Service Announcement
2.1 What is Cybersecurity?
2.4 Hacking Ethics
2.4 Hacking Ethics
Standard
10.3 Internet Safety
10.4 Privacy & Security
10.7 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.4 Privacy & Security
4.7 Project: Public Service Announcement
21.3 Project: Public Service Announcement
Standard
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
8.7 Routing
8.8 Packets & Protocols
8.10 Viewing a Webpage
13.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.3 Privacy & Security
1.8 Hacking Ethics
1.8 Hacking Ethics
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
9.7 Routing
9.7 Routing
9.8 Packets & Protocols
9.8 Packets & Protocols
9.9 Viewing a Webpage
9.9 Viewing a Webpage
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
5.7 Network Administrator
Standard
5.7 Network Administrator
Standard
4.4 Cybersecurity
4.6 Encryption
6.4 Privacy & Security
Standard
1.6 Application Security
2.7 Routing
2.7 Routing
2.8 Packets & Protocols
2.8 Packets & Protocols
2.9 Viewing a Webpage
2.9 Viewing a Webpage
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.7 Routing
9.7 Routing
9.8 Packets & Protocols
9.8 Packets & Protocols
9.9 Viewing a Webpage
9.9 Viewing a Webpage
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
Standard
5.4 Privacy & Security
Standard
2.4 Cybersecurity
2.6 Encryption
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.6 Cybersecurity
4.8 Encryption