Please enable JavaScript to use CodeHS

SD CSE: SD.CSE.2.4

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
7.8 Cryptography
10.9 Cybersecurity
Standard
4.8 Application Security
Standard
9.2 Assessing Risks
Standard
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
Standard
5.8 Application Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
2.8 Application Security
Standard
1.8 Application Security
4.5 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
12.3 Internet Safety
12.4 Privacy & Security
13.6 Application Security
Standard
2.9 Application Security
Standard
6.6 Application Security
12.2 Assessing Risks
21.4 Privacy & Security
21.3 Internet Safety
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
7.7 Cryptography
8.10 Cybersecurity
Standard
8.4 Privacy & Security
8.3 Internet Safety
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
Standard
2.1 Privacy & Security
3.6 Application Security
Standard
5.5 Internet Safety
5.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.8 Application Security
Standard
6.10 Cryptography
7.9 Cybersecurity
8.5 Application Security
Standard
4.8 Application Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
10.8 Application Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
7.6 Application Security
13.2 Assessing Risks
Standard
6.10 Cybersecurity
Standard
5.8 Application Security
Standard
3.6 Application Security
Standard
10.3 Internet Safety
10.4 Privacy & Security
Standard
1.6 Application Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
6.6 Application Security
15.2 Assessing Risks
Standard
1.3 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
4.6 Application Security
13.2 Assessing Risks
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity