Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: 28

CodeHS Lessons

Research and describe the most common security threats to computer systems, such as social engineering, malware, phishing, viruses, etc. Investigate and distinguish among the following common prevention methods to secure a computer system. For a given scenario, identify the most applicable best practice to secure a workstation as well as describe methods for data destruction and disposal. Implement these practices and write a justification for each scenario solution. Provide supporting evidence for each solution, drawing on technical texts and industry standards. Prevention methods include: a. Physical security (e.g., lock doors, tailgating, biometrics, badges, key fobs, retinal, etc.) b. Digital security (e.g., antivirus, firewalls, antispyware, user authentication, etc.) c. User education d. Principles of least privilege

Standard
1.7 Common Cyber Attacks and Prevention
8.5 Environmental Controls
Standard
13.9 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.2 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.2 Impact of Cybersecurity
Standard
8.2 Impact of Cybersecurity
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
Standard
13.3 Impact of Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
4.7 Common Cyber Attacks and Prevention
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.7 Common Cyber Attacks and Prevention
8.5 Environmental Controls
Standard
1.7 Common Cyber Attacks and Prevention
8.5 Environmental Controls
Standard
13.3 Impact of Cybersecurity
Standard
5.7 Common Cyber Attacks and Prevention
Standard
11.3 Impact of Cybersecurity
Standard
8.1 Common Cyber Attacks and Prevention
Standard
8.1 Common Cyber Attacks and Prevention
Standard
1.4 Impact of Cybersecurity
Standard
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
4.7 Common Cyber Attacks and Prevention
Standard
1.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity