Please enable JavaScript to use CodeHS

WI 9-12: NI1.a.6.h

CodeHS Lessons

Provide examples of personal data that should be kept secure and the methods by which individuals keep their private data secure.

Standard
10.4 Level 4: Data and Licenses
Standard
9.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
7.7 Ethical Issues Around Data Collection
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.7 Privacy & Security
Standard
8.13 Ethical Issues Around Data Collection
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
2.8 Network Administration
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.6 Privacy & Security
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
12.4 Privacy & Security
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
11.4 Level 4: Data and Licenses
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
8.4 Privacy & Security
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.4 Privacy & Security
6.10 Network Administration
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
5.10 Network Administration
Standard
7.13 Ethical Issues Around Data Collection
Standard
2.1 Privacy & Security
2.6 Level 4: Data and Licenses
Standard
5.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.7 Privacy & Security
Standard
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
19.4 Level 4: Data and Licenses
Standard
10.4 Privacy & Security
Standard
7.13 Ethical Issues Around Data Collection
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
14.4 Level 4: Data and Licenses
Standard
1.3 Privacy & Security
Standard
2.4 Privacy & Security
7.4 Level 4: Data and Licenses
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
Standard
14.7 Ethical Issues Around Data Collection
Standard
13.7 Ethical Issues Around Data Collection