Practical Example: The CIA Triad

Classifying Security Incidents by the CIA Triad

Problem Statement: A hospital's network experiences three distinct security incidents. Categorize each incident based on which pillar of the CIA Triad (Confidentiality, Integrity, Availability) was primarily compromised.

Step-by-Step Solution

0 of 3 Steps Completed
1

Practical Example: Cryptography and Hashing

Understanding Symmetric vs. Asymmetric Encryption

Problem Statement: Alice wants to send a highly sensitive blueprint document to Bob over the internet. Compare the process of using Symmetric Encryption versus Asymmetric Encryption.

Step-by-Step Solution

0 of 2 Steps Completed
1

Storing Passwords: Plaintext vs. Hashing vs. Salting

Problem Statement: A web application needs to store user passwords in its database. Explain the progression of security from plaintext to salted hashes.

Step-by-Step Solution

0 of 3 Steps Completed
1

Practical Example: Common Cyber Threats & Web Vulnerabilities

Identifying Common Attack Vectors

Problem Statement: Classify the following attack scenarios based on common threat types (e.g., Phishing, SQL Injection, DDoS).

Step-by-Step Solution

0 of 3 Steps Completed
1

Practical Example: Web Vulnerabilities (XSS)

Analyzing a Cross-Site Scripting Attack

Problem Statement: A social media website allows users to post public comments but does not sanitize the input. Explain how an attacker could exploit this using Cross-Site Scripting (XSS) to steal another user's session cookies.

Step-by-Step Solution

0 of 4 Steps Completed
1