Please enable JavaScript to use CodeHS

SD CS Principles: SD.CSP.2.4

CodeHS Lessons

Recommend various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
8.10 Cryptography
11.8 Cybersecurity
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
2.3 Internet Safety
2.4 Privacy & Security
7.4 Software and Applications
Standard
8.3 Risk Response
Standard
9.3 Internet Safety
9.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.6 Internet Safety
1.7 Privacy & Security
Standard
6.5 Software and Applications
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.7 Software and Applications
4.5 Privacy & Security
Standard
1.3 Privacy & Security
5.4 Software and Applications
Standard
1.3 Privacy & Security
2.6 Software and Applications
Standard
8.10 Cryptography
11.9 Cybersecurity
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
12.3 Internet Safety
12.4 Privacy & Security
13.4 Software and Applications
Standard
14.4 Software and Applications
Standard
14.4 Software and Applications
Standard
6.4 Software and Applications
12.3 Risk Response
21.4 Privacy & Security
21.3 Internet Safety
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
3.4 Software and Applications
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
7.7 Cryptography
8.2 Software and Applications
8.10 Cybersecurity
Standard
7.7 Cryptography
8.2 Software and Applications
8.10 Cybersecurity
Standard
8.4 Privacy & Security
8.3 Internet Safety
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
Standard
2.1 Privacy & Security
3.4 Software and Applications
Standard
5.5 Internet Safety
5.6 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
10.6 Software and Applications
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.3 Internet Safety
1.4 Privacy & Security
2.4 Software and Applications
Standard
1.3 Internet Safety
1.4 Privacy & Security
2.4 Software and Applications
Standard
1.6 Internet Safety
1.7 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
7.4 Software and Applications
13.3 Risk Response
Standard
7.9 Cybersecurity
Standard
10.3 Internet Safety
10.4 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
6.4 Software and Applications
15.3 Risk Response
Standard
1.3 Privacy & Security
Standard
2.3 Internet Safety
2.4 Privacy & Security
4.4 Software and Applications
13.3 Risk Response
Standard
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
5.6 Cybersecurity
6.7 Software and Applications
Standard
5.6 Cybersecurity
7.7 Software and Applications
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.4 Software and Applications
Standard
7.8 Cryptography
10.9 Cybersecurity
Standard
3.5 Internet Safety
3.6 Privacy & Security