- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
Tennessee Cybersecurity I: 28
CodeHS Lessons
Research and describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc. Investigate and distinguish among the following common prevention methods to secure a computer system. For a given scenario, identify the most applicable best practice to secure a workstation as well as describe methods for data destruction and disposal. Implement these practices and write a justification for each scenario solution. Provide supporting evidence for each solution, drawing on technical texts and industry standards. Prevention methods include: a. Physical security (e.g., lock doors, tailgating, biometrics, badges, key fobs, retinal, etc.) b. Digital security (e.g., antivirus, firewalls, antispyware, user authentication, etc.) c. User education d. Principles of least privilege
Standard |
1.7 Common Cyber Attacks and Prevention |
8.5 Environmental Controls |
Standard |
13.9 Impact of Cybersecurity |
Standard |
15.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
1.2 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
4.2 Impact of Cybersecurity |
Standard |
8.2 Impact of Cybersecurity |
Standard |
8.3 Impact of Cybersecurity |
Standard |
11.2 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
1.7 Common Cyber Attacks and Prevention |
Standard |
1.7 Common Cyber Attacks and Prevention |
Standard |
13.3 Impact of Cybersecurity |
Standard |
16.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
4.7 Common Cyber Attacks and Prevention |
Standard |
4.7 Common Cyber Attacks and Prevention |
Standard |
1.7 Common Cyber Attacks and Prevention |
8.5 Environmental Controls |
Standard |
1.7 Common Cyber Attacks and Prevention |
8.5 Environmental Controls |
Standard |
13.3 Impact of Cybersecurity |
Standard |
5.7 Common Cyber Attacks and Prevention |
Standard |
11.3 Impact of Cybersecurity |
Standard |
8.1 Common Cyber Attacks and Prevention |
Standard |
8.1 Common Cyber Attacks and Prevention |
Standard |
1.4 Impact of Cybersecurity |
Standard |
9.2 Impact of Cybersecurity |
Standard |
15.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
1.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
Standard |
4.7 Common Cyber Attacks and Prevention |
Standard |
1.3 Impact of Cybersecurity |
Standard |
13.3 Impact of Cybersecurity |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company