Please enable JavaScript to use CodeHS

Tennessee Computer Science Foundations 2025: 14.2

CodeHS Lessons

Demonstrate an understanding of the various security breaches that can occur with the Internet. Prepare a text explaining enterprise-level security, the purpose of encryption, and the protocols that can be implemented to secure web sites. Evaluate personal privacy issues versus employers’ rights to regulate computing resources.

Standard
8.2 Impact of Cybersecurity
8.3 The CIA Triad