- What is CodeHS?
 - Curriculum
 - Platform
 - Assignments
 - Classroom Management
 - Grading
 - Gradebook
 - Progress Tracking
 - Lesson Plans
 - Offline Handouts
 - Problem Guides
 - Practice
 - Create
 - Problem Bank
 - Playlist Bank
 - Quiz Scores
 - Rostering
 - Integrations
 - Professional Development
 - Stories
 - Standards
 - States
 - Alabama
 - Alaska
 - Arizona
 - Arkansas
 - California
 - Colorado
 - Connecticut
 - D.C.
 - Delaware
 - Florida
 - Georgia
 - Hawaii
 - Idaho
 - Illinois
 - Indiana
 - Iowa
 - Kansas
 - Kentucky
 - Louisiana
 - Maine
 - Maryland
 - Massachusetts
 - Michigan
 - Minnesota
 - Mississippi
 - Missouri
 - Montana
 - Nebraska
 - Nevada
 - New Hampshire
 - New Jersey
 - New Mexico
 - New York
 - North Carolina
 - North Dakota
 - Ohio
 - Oklahoma
 - Oregon
 - Pennsylvania
 - Rhode Island
 - South Carolina
 - South Dakota
 - Tennessee
 - Texas
 - Utah
 - Vermont
 - Virginia
 - Washington
 - West Virginia
 - Wisconsin
 - Wyoming
 - State Standards
 - Plans
 - Resources
 - Districts
 - Share
 - Contact Us
 - Company
 
    
    SC 9-12: HS2.NI.2.1
CodeHS Lessons
Evaluate how sensitive data can be affected by malware and other attacks (e.g., denial-of-service attacks, ransomware, viruses, worms, spyware, phishing) (CSTA, 2017).
| Standard | 
| 4.8 Application Security | 
| Standard | 
| 3.2 Malware Types and Prevention | 
| 3.4 Additional Attacks | 
| 3.5 Cross-site Scripting | 
| Standard | 
| 13.7 Network Attacks | 
| 13.1 What is Cybersecurity? | 
| 13.9 Impact of Cybersecurity | 
| Standard | 
| 9.4 Privacy & Security | 
| 15.2 What is Cybersecurity? | 
| 15.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.2 Impact of Cybersecurity | 
| 1.7 Privacy & Security | 
| 12.9 Common Security Problems | 
| 12.10 SQL Injection Overview | 
| 12.11 Types of SQLi and Prevention | 
| Standard | 
| 5.8 Application Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 11.6 Application Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 7.8 Common Security Problems | 
| 7.9 SQL Injection Overview | 
| 7.10 Types of SQLi and Prevention | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 2.8 Application Security | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.9 Application Security | 
| Standard | 
| 1.8 Application Security | 
| 2.8 Network Administration | 
| 4.1 What is Cybersecurity? | 
| 4.2 Impact of Cybersecurity | 
| 4.5 Privacy & Security | 
| Standard | 
| 1.3 Privacy & Security | 
| 1.6 Common Security Problems | 
| Standard | 
| 1.3 Privacy & Security | 
| 1.6 Common Security Problems | 
| 8.2 Impact of Cybersecurity | 
| 8.4 Malware Types and Prevention | 
| 8.6 Additional Attacks | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| 1.12 Common Security Problems | 
| 8.7 Network Attacks | 
| 22.9 SQL Injection Overview | 
| 22.10 Types of SQLi and Prevention | 
| 22.11 Cross-site Scripting | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 8.2 What is Cybersecurity? | 
| 8.3 Impact of Cybersecurity | 
| Standard | 
| 11.1 What is Cybersecurity? | 
| 11.2 Impact of Cybersecurity | 
| 12.4 Privacy & Security | 
| 13.6 Application Security | 
| 14.9 Common Security Problems | 
| 14.10 SQL Injection Overview | 
| 14.11 Types of SQLi and Prevention | 
| Standard | 
| 2.9 Application Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 6.6 Application Security | 
| 9.9 Common Security Problems | 
| 9.10 SQL Injection Overview | 
| 9.11 Types of SQLi and Prevention | 
| 21.4 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 3.6 Application Security | 
| Standard | 
| 4.5 Application Security | 
| Standard | 
| 4.6 Application Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 8.4 Privacy & Security | 
| 16.2 What is Cybersecurity? | 
| 16.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 1.4 Privacy & Security | 
| 6.9 Network Attacks | 
| 6.10 Network Administration | 
| 10.9 Common Security Problems | 
| 10.10 SQL Injection Overview | 
| 10.11 Types of SQLi and Prevention | 
| 10.12 Cross-site Scripting | 
| Standard | 
| 2.4 Privacy & Security | 
| 5.9 Network Attacks | 
| 5.10 Network Administration | 
| Standard | 
| 1.6 Application Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 2.1 Privacy & Security | 
| 3.6 Application Security | 
| Standard | 
| 5.1 What is Cybersecurity? | 
| 5.6 Privacy & Security | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.8 Application Security | 
| Standard | 
| 8.5 Application Security | 
| Standard | 
| 4.8 Application Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 10.8 Application Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 11.2 What is Cybersecurity? | 
| 11.3 Impact of Cybersecurity | 
| Standard | 
| 1.4 Privacy & Security | 
| Standard | 
| 1.4 Privacy & Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.7 Privacy & Security | 
| Standard | 
| 1.3 What is Cybersecurity? | 
| 1.4 Impact of Cybersecurity | 
| 2.4 Privacy & Security | 
| 7.6 Application Security | 
| 8.2 Malware Types and Prevention | 
| 17.9 Common Security Problems | 
| 17.9 Common Security Problems | 
| 17.10 SQL Injection Overview | 
| 17.10 SQL Injection Overview | 
| 17.11 Types of SQLi and Prevention | 
| 17.11 Types of SQLi and Prevention | 
| Standard | 
| 8.1 What is Cybersecurity? | 
| 8.2 Impact of Cybersecurity | 
| Standard | 
| 5.8 Application Security | 
| Standard | 
| 3.6 Application Security | 
| Standard | 
| 2.1 What is Cybersecurity? | 
| Standard | 
| 10.4 Privacy & Security | 
| 15.2 What is Cybersecurity? | 
| 15.3 Impact of Cybersecurity | 
| Standard | 
| 1.6 Application Security | 
| Standard | 
| 4.4 Privacy & Security | 
| Standard | 
| 1.5 Privacy & Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 2.4 Privacy & Security | 
| 6.6 Application Security | 
| 7.4 Common Security Problems | 
| 7.5 SQL Injection Overview | 
| 7.6 Types of SQLi and Prevention | 
| 13.2 Malware Types and Prevention | 
| 13.4 Additional Attacks | 
| 13.5 Cross-site Scripting | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.3 Privacy & Security | 
| Standard | 
| 1.2 What is Cybersecurity? | 
| 1.3 Impact of Cybersecurity | 
| 2.4 Privacy & Security | 
| 4.6 Application Security | 
| 5.10 Common Security Problems | 
| 5.11 SQL Injection Overview | 
| 5.12 Types of SQLi and Prevention | 
| Standard | 
| 1.1 What is Cybersecurity? | 
| 1.6 Privacy & Security | 
| Standard | 
| 4.4 Privacy & Security | 
| 13.2 What is Cybersecurity? | 
| 13.3 Impact of Cybersecurity | 
| Standard | 
| 9.1 What is Cybersecurity? | 
| 9.2 Impact of Cybersecurity | 
| Standard | 
| 5.7 Privacy & Security | 
| Standard | 
| 3.4 Privacy & Security | 
- What is CodeHS?
 - Curriculum
 - Platform
 - Assignments
 - Classroom Management
 - Grading
 - Gradebook
 - Progress Tracking
 - Lesson Plans
 - Offline Handouts
 - Problem Guides
 - Practice
 - Create
 - Problem Bank
 - Playlist Bank
 - Quiz Scores
 - Rostering
 - Integrations
 - Professional Development
 - Stories
 - Standards
 - States
 - Alabama
 - Alaska
 - Arizona
 - Arkansas
 - California
 - Colorado
 - Connecticut
 - D.C.
 - Delaware
 - Florida
 - Georgia
 - Hawaii
 - Idaho
 - Illinois
 - Indiana
 - Iowa
 - Kansas
 - Kentucky
 - Louisiana
 - Maine
 - Maryland
 - Massachusetts
 - Michigan
 - Minnesota
 - Mississippi
 - Missouri
 - Montana
 - Nebraska
 - Nevada
 - New Hampshire
 - New Jersey
 - New Mexico
 - New York
 - North Carolina
 - North Dakota
 - Ohio
 - Oklahoma
 - Oregon
 - Pennsylvania
 - Rhode Island
 - South Carolina
 - South Dakota
 - Tennessee
 - Texas
 - Utah
 - Vermont
 - Virginia
 - Washington
 - West Virginia
 - Wisconsin
 - Wyoming
 - State Standards
 - Plans
 - Resources
 - Districts
 - Share
 - Contact Us
 - Company