- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
TN CI: C10H14.15
CodeHS Lessons
Document the security risks associated with new applications and evaluate the severity of the risk involved in each, including but not limited to: a. Identifying threats to information systems facilities, data communications systems, and other applications b. Adhering to federal and state legislation pertaining to computer crime, fraud, and abuse c. Providing means for preserving confidentiality and encryption of sensitive data d. Detailing steps to recover from routine errors or catastrophic failures, such as might be caused by a malicious computer virus
Standard |
8.6 Checking for Vulnerabilities |
8.7 Risky Business |
Standard |
12.9 Common Security Problems |
12.10 SQL Injection Overview |
12.11 Types of SQLi and Prevention |
Standard |
1.6 Common Security Problems |
Standard |
1.6 Common Security Problems |
Standard |
1.12 Common Security Problems |
22.9 SQL Injection Overview |
22.10 Types of SQLi and Prevention |
22.12 Project: Security Assessment Report |
Standard |
1.6 Common Security Problems |
Standard |
14.9 Common Security Problems |
14.10 SQL Injection Overview |
14.11 Types of SQLi and Prevention |
Standard |
9.9 Common Security Problems |
9.10 SQL Injection Overview |
9.11 Types of SQLi and Prevention |
10.1 Project: Security Assessment Report |
Standard |
10.9 Common Security Problems |
10.10 SQL Injection Overview |
10.11 Types of SQLi and Prevention |
Standard |
8.6 Checking for Vulnerabilities |
8.7 Risky Business |
Standard |
8.6 Checking for Vulnerabilities |
8.7 Risky Business |
Standard |
17.9 Common Security Problems |
17.9 Common Security Problems |
17.10 SQL Injection Overview |
17.10 SQL Injection Overview |
17.11 Types of SQLi and Prevention |
17.11 Types of SQLi and Prevention |
9.1 Project: Security Assessment Report |
Standard |
7.4 Common Security Problems |
7.5 SQL Injection Overview |
7.6 Types of SQLi and Prevention |
Standard |
5.10 Common Security Problems |
5.11 SQL Injection Overview |
5.12 Types of SQLi and Prevention |
6.1 Project: Security Assessment Report |
Standard |
8.9 Common Security Problems |
8.10 SQL Injection Overview |
8.11 Types of SQLi and Prevention |
14.1 Project: Security Assessment Report |
Standard |
6.6 Checking for Vulnerabilities |
6.7 Risky Business |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company