Please enable JavaScript to use CodeHS

Utah Computer Programming 2: UT.CP2.7.1e

CodeHS Lessons

Give examples of ways to protect information on computer systems (attacks, viruses, malware, etc.)

Standard
11.9 Cybersecurity
Standard
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.4 Additional Attacks
5.5 Cross-site Scripting
Standard
5.8 Application Security
5.9 Browser Configuration
5.10 System Administration
Standard
1.8 Application Security
1.9 System Administration
Standard
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
8.6 Additional Attacks
Standard
11.9 Cybersecurity
Standard
22.11 Cross-site Scripting
Standard
13.6 Application Security
13.7 Browser Configuration
13.8 System Administration
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
8.10 Cybersecurity
Standard
10.12 Cross-site Scripting
Standard
3.6 Application Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.8 Browser Configuration
Standard
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
7.9 Cybersecurity
8.5 Application Security
Standard
4.8 Application Security
4.9 Browser Configuration
4.10 System Administration
Standard
10.8 Application Security
10.9 Browser Configuration
10.10 System Administration
Standard
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Network Attacks
8.2 Malware Types and Prevention
Standard
7.9 Cybersecurity
9.4 System Administration
Standard
6.6 Application Security
6.7 Browser Configuration
6.8 System Administration
13.1 Network Attacks
13.2 Malware Types and Prevention
13.3 Common Network Attacks
13.4 Additional Attacks
13.5 Cross-site Scripting
Standard
4.6 Application Security
4.7 Browser Configuration
4.8 System Administration
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
9.1 Computer Science Careers
Standard
17.1 Computer Science Careers
Standard
8.1 Computer Science Careers
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
1.7 Browser Configuration
1.8 System Administration
Standard
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration