Please enable JavaScript to use CodeHS

SC 9-12: HS2.NI.2.2

CodeHS Lessons

Compare and contrast ways software developers protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).

Standard
1.3 Advanced Cryptography
1.4 Hash Functions
8.2 Assessing Risks
6.1 Project Security Assessment Report
Standard
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
Standard
4.3 Advanced Cryptography
4.4 Hash Functions
12.2 Assessing Risks
Standard
11.7 Advanced Cryptography
11.8 Hash Functions
Standard
2.3 Asymmetric Encryption
Standard
2.3 Asymmetric Encryption
Standard
5.3 Advanced Cryptography
5.4 Hash Functions
13.2 Assessing Risks
Standard
4.6 Hash Functions
15.2 Assessing Risks
Standard
13.2 Assessing Risks