Practical Example: The CIA Triad
Classifying Security Incidents by the CIA Triad
Problem Statement: A hospital's network experiences three distinct security incidents. Categorize each incident based on which pillar of the CIA Triad (Confidentiality, Integrity, Availability) was primarily compromised.
Step-by-Step Solution
0 of 3 Steps Completed1
Practical Example: Cryptography and Hashing
Understanding Symmetric vs. Asymmetric Encryption
Problem Statement: Alice wants to send a highly sensitive blueprint document to Bob over the internet. Compare the process of using Symmetric Encryption versus Asymmetric Encryption.
Step-by-Step Solution
0 of 2 Steps Completed1
Storing Passwords: Plaintext vs. Hashing vs. Salting
Problem Statement: A web application needs to store user passwords in its database. Explain the progression of security from plaintext to salted hashes.
Step-by-Step Solution
0 of 3 Steps Completed1
Practical Example: Common Cyber Threats & Web Vulnerabilities
Identifying Common Attack Vectors
Problem Statement: Classify the following attack scenarios based on common threat types (e.g., Phishing, SQL Injection, DDoS).
Step-by-Step Solution
0 of 3 Steps Completed1
Practical Example: Web Vulnerabilities (XSS)
Analyzing a Cross-Site Scripting Attack
Problem Statement: A social media website allows users to post public comments but does not sanitize the input. Explain how an attacker could exploit this using Cross-Site Scripting (XSS) to steal another user's session cookies.
Step-by-Step Solution
0 of 4 Steps Completed1