Please enable JavaScript to use CodeHS

SC 9-12: HS3.NI.2.2

CodeHS Lessons

Evaluate various security measures, considering tradeoffs between the usability and security of a computing system. (e.g., a web filter that prevents access to many educational sites but keeps a campus’ network safe) (CSTA, 2017).

Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.5 Network Communication
1.9 System Administration
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
5.12 Network Communication
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
12.4 Privacy & Security
13.7 Browser Configuration
13.8 System Administration
Standard
6.7 Browser Configuration
6.8 System Administration
7.6 Network Communication
12.2 Assessing Risks
12.3 Risk Response
21.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
3.7 Browser Configuration
3.8 System Administration
5.6 Network Communication
Standard
4.7 Browser Configuration
4.8 System Administration
6.6 Network Communication
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
8.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
2.4 Privacy & Security
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
2.1 Privacy & Security
3.7 Browser Configuration
3.8 System Administration
4.10 Network Communication
Standard
5.6 Privacy & Security
5.8 Browser Configuration
Standard
1.6 Privacy & Security
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
Standard
4.9 Browser Configuration
4.10 System Administration
6.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
10.9 Browser Configuration
10.10 System Administration
12.10 Network Communication
Standard
4.4 Privacy & Security
Standard
1.4 Privacy & Security
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
7.7 Browser Configuration
7.8 System Administration
11.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
Standard
9.4 System Administration
Standard
10.4 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
6.7 Browser Configuration
6.8 System Administration
9.6 Network Communication
15.2 Assessing Risks
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
4.7 Browser Configuration
4.8 System Administration
10.6 Network Communication
13.2 Assessing Risks
13.3 Risk Response
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
Standard
6.8 Browser Configuration
Standard
7.8 Browser Configuration
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
2.4 Privacy & Security
7.7 Browser Configuration
7.8 System Administration
10.6 Network Communication
Standard
4.4 Privacy & Security
Standard
1.6 Privacy & Security