Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.3

CodeHS Lessons

Explain specific trade-offs when selecting and implementing security recommendations.

Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
6.4 Storage Options
6.7 Network Options
6.10 Network Communication
Standard
6.4 Mobile Devices
9.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.4 Storage Options
6.7 Network Options
6.8 Network Communication
Standard
1.6 Privacy & Security
Standard
1.2 Storage Options
1.4 Network Options
1.5 Network Communication
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
3.2 Storage Options
3.7 Mobile Devices
5.10 Network Options
5.12 Network Communication
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
3.8 Network Options
3.9 Network Communication
Standard
3.7 Cybersecurity Essentials
Standard
7.4 Storage Options
7.5 Network Options
7.6 Network Communication
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
5.4 Storage Options
5.5 Network Options
5.6 Network Communication
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
6.4 Storage Options
6.5 Network Options
6.6 Network Communication
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
2.1 Privacy & Security
4.6 Storage Options
4.7 Network Options
4.10 Network Communication
4.14 Mobile Devices
Standard
5.6 Privacy & Security
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
1.6 Privacy & Security
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
6.4 Storage Options
6.7 Network Options
6.10 Network Communication
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
6.4 Storage Options
6.7 Network Options
6.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
5.6 Cybersecurity Essentials
5.7 Common Cyber Attacks and Prevention
12.4 Storage Options
12.7 Network Options
12.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
2.3 Storage Options
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.4 Privacy & Security
2.3 Storage Options
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
11.4 Storage Options
11.5 Network Options
11.6 Network Communication
13.3 Risk Response
18.5 Mobile Devices
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
2.4 Authentication Methods
5.4 Storage Options
5.6 Network Options
5.10 Network Communication
7.8 Risk Response
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
9.4 Storage Options
9.5 Network Options
9.6 Network Communication
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.10 Mobile Devices
10.4 Storage Options
10.5 Network Options
10.6 Network Communication
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.4 Storage Options
6.5 Network Options
Standard
7.4 Storage Options
7.5 Network Options
Standard
4.6 Cybersecurity Essentials
4.7 Common Cyber Attacks and Prevention
Standard
2.4 Privacy & Security
10.4 Storage Options
10.5 Network Options
10.6 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Cybersecurity Essentials
1.7 Common Cyber Attacks and Prevention
4.4 Storage Options
4.7 Network Options
4.10 Network Communication
Standard
3.6 Cybersecurity Essentials
3.7 Common Cyber Attacks and Prevention
Standard
3.5 Mobile Devices
8.3 Risk Response