Please enable JavaScript to use CodeHS

WA 3A: 3A-NI-07

CodeHS Lessons

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

Standard
11.9 Cybersecurity
Standard
4.8 Application Security
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
8.3 Risk Response
Standard
6.5 The CIA Triad
6.5 The CIA Triad
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
13.8 The CIA Triad
13.8 The CIA Triad
Standard
15.4 The CIA Triad
15.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.3 The CIA Triad
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
5.8 Application Security
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.8 Application Security
2.8 Network Administration
2.8 Network Administration
4.4 The CIA Triad
4.4 The CIA Triad
4.7 Hash Functions
4.7 Hash Functions
Standard
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.6 Common Security Problems
1.6 Common Security Problems
Standard
11.9 Cybersecurity
Standard
1.2 The CIA Triad
1.2 The CIA Triad
1.12 Common Security Problems
1.12 Common Security Problems
21.2 History of Cryptography
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.2 History of Cryptography
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
Standard
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
8.4 The CIA Triad
8.4 The CIA Triad
Standard
11.3 The CIA Triad
11.3 The CIA Triad
13.6 Application Security
14.9 Common Security Problems
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
14.11 Types of SQLi and Prevention
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
12.3 Risk Response
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
2.3 Asymmetric Encryption
3.6 Application Security
Standard
2.3 Asymmetric Encryption
4.6 Application Security
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
8.10 Cybersecurity
Standard
10.2 History of Cryptography
16.4 The CIA Triad
10.2 History of Cryptography
16.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
6.10 Network Administration
6.10 Network Administration
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
10.12 Cross-site Scripting
11.2 History of Cryptography
11.2 History of Cryptography
11.7 Advanced Cryptography
11.7 Advanced Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast
Standard
5.10 Network Administration
5.10 Network Administration
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
1.6 Application Security
Standard
3.6 Application Security
Standard
5.2 The CIA Triad
5.2 The CIA Triad
Standard
4.5 The CIA Triad
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
2.3 Asymmetric Encryption
4.8 Application Security
Standard
7.9 Cybersecurity
8.5 Application Security
Standard
2.3 Asymmetric Encryption
4.8 Application Security
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
10.8 Application Security
Standard
5.2 History of Cryptography
5.2 History of Cryptography
11.4 The CIA Triad
11.4 The CIA Triad
Standard
1.3 The CIA Triad
1.3 The CIA Triad
Standard
1.5 The CIA Triad
1.5 The CIA Triad
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
13.3 Risk Response
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
Standard
7.9 Cybersecurity
9.3 The CIA Triad
9.3 The CIA Triad
Standard
2.2 The CIA Triad
2.2 The CIA Triad
Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
13.5 Cross-site Scripting
15.2 Assessing Risks
15.3 Risk Response
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
1.4 The CIA Triad
1.4 The CIA Triad
4.6 Application Security
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
8.2 History of Cryptography
8.2 History of Cryptography
13.2 Assessing Risks
13.3 Risk Response
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
5.6 Cybersecurity
Standard
4.5 The CIA Triad
4.5 The CIA Triad
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.6 Application Security
Standard
10.9 Cybersecurity
Standard
1.4 The CIA Triad
1.4 The CIA Triad
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.2 The CIA Triad
Standard
4.7 The CIA Triad