Module 1 · Fundamentals

CIA Triad & Authentication Fundamentals

Confidentiality, Integrity, Availability — Understanding public key cryptography and password security

Scenario: You're a cybersecurity analyst for a financial institution. Your job is to protect customer data using the three pillars of information security. Understanding these fundamentals will help you implement proper authentication and encryption systems.

🛡️ The CIA Triad

🎯 Why This Matters — CIA is the universal security taxonomy. Every risk, control, and compliance requirement maps to at least one of these three pillars. This demo builds the mental model you will use for every other topic in this course.

Click on each pillar to explore how it protects information:

🔒
Confidentiality
Data privacy & secrecy
Integrity
Data accuracy & trustworthiness
Availability
System accessibility & uptime

Select a CIA pillar above to see detailed examples and threats

🎯 CIA Threat Simulator

🔑 Symmetric vs Asymmetric (Public Key) Cryptography

🎯 Why This Matters — Real systems use both cryptographic paradigms for different problems. Understanding when to use symmetric (speed, bulk data) vs asymmetric (key distribution, authentication) is foundational to designing secure protocols like TLS.

📌 Scenario

You're a developer who needs to give a teammate remote access to a production server — without ever emailing them a password. You also need to encrypt customer records at rest as fast as possible. These two problems require different types of cryptography. Understanding when to use symmetric vs asymmetric encryption is one of the most practical skills in cybersecurity.

🔑 Symmetric Key
Alice ←→ [Same Key] ←→ Bob
🔒 Encrypt with Key A
🔓 Decrypt with Key A
✓ Fast & efficient
✗ Key distribution problem
VS
🔐 Public Key (Asymmetric)
Alice ←→ [Public/Private Keys] ←→ Bob
🔒 Encrypt with Bob's Public Key
🔓 Decrypt with Bob's Private Key
✓ Secure key exchange
✗ Slower computation

💡 Why this matters in practice

Use Symmetric when:

  • Encrypting large files or databases
  • Both parties already share a key securely
  • Speed is critical (AES is ~1000× faster than RSA)

Use Asymmetric when:

  • Establishing a secure connection for the first time
  • Authenticating identity (digital signatures)
  • Sharing a symmetric key safely over the internet

🔐 Real-world example: HTTPS uses asymmetric encryption (RSA/ECDH) only to exchange a temporary symmetric key, then switches to AES for the rest of the session — getting the best of both worlds.

🖥️ Try it yourself — Generate Your Own Key Pair

Your browser detected you're on . The correct commands are pre-selected below. Open your terminal and run them to create a real RSA key pair.

← not right? switch here
How to open Terminal on macOS
Option 1 — Spotlight (fastest): Press ⌘ Space, type Terminal, press Enter
Option 2 — Finder: Applications → Utilities → Terminal
Option 3 — Dock: If Terminal is in your Dock, click its icon directly
iTerm2 users: Any of the above works — iTerm2 is a drop-in replacement for Terminal
# 1. Generate a 4096-bit RSA key pair (press Enter to accept defaults)
ssh-keygen -t rsa -b 4096 -C "your.email@example.com"

# 2. View your PUBLIC key — safe to share with anyone
cat ~/.ssh/id_rsa.pub

# 3. View your PRIVATE key — never share this!
cat ~/.ssh/id_rsa
🔑 Key rule: Your public key (.pub) can be freely shared — it's how others encrypt messages for you or verify your identity. Your private key (no extension) must never leave your machine.

📸 Upload Your Terminal Screenshot

After running the commands above, take a screenshot of your terminal showing both the public and private key output. Upload it here as proof of completion.

🔐 Why Do We Have Passwords?

🎯 Why This Matters — Despite being the weakest common authentication mechanism, passwords protect billions of accounts. Understanding why passwords fail motivates better alternatives: MFA, hardware keys, and proper password hashing with algorithms like bcrypt and Argon2.

Authentication: Passwords verify "you are who you say you are"

Without authentication, anyone could access your accounts, files, and sensitive information.

🧪 Password Generator Task

Use a password generator to create three passwords — one for each strength level — then paste them in the fields below. Each field will validate your entry and show you the estimated crack time.

Short password — under 8 characters (e.g. hello123)

Mix of letters & numbers, 8–11 characters (e.g. Coffee2024)

12+ characters with uppercase, lowercase, numbers & symbols (e.g. T!ger$8x#Mango)

⚠️ Password Vulnerabilities

  • Dictionary attacks (using common words)
  • Brute force attacks (trying all combinations)
  • Social engineering (guessing personal info)
  • Data breaches (passwords stolen from other sites)

❓ Which CIA principle is MOST violated when an attacker intercepts and reads your encrypted email without authorization?

💭 Learning Reflection Submission

After interacting with the CIA triad, public key concepts, and password strength tools, reflect on your learning:

Guided Questions:
  • What does each pillar of the CIA triad protect against — and can you give a real-world example for each?
  • How does public key cryptography solve the key distribution problem that symmetric encryption cannot?
  • Why is password length generally more important than complexity when it comes to brute-force resistance?
  • What is the difference between authentication and authorization? Why does it matter?
  • Key question: An attacker intercepts your encrypted email and reads its contents without modifying it. Which CIA principle is violated — and why are the other two not violated in this specific scenario?

🔒 Complete all objectives (tracker bottom-right ↘) to unlock submission

Was there anything within the lab you expected to change, but didn't?

💡 Why it matters

The CIA Triad forms the foundation of all cybersecurity practices:

Public key cryptography solves the key distribution problem, enabling secure communication over insecure channels. Strong authentication (passwords, multi-factor auth) ensures only authorized users access protected systems.

📋 0/6 objectives
Lab Objectives
💡 You can reopen this tour anytime via the ❓ Help button in the top bar.

🔐 Welcome to Cryptography Labs!

Let's take a quick tour of how these labs work. By the end, you'll understand:

  • The objective system that unlocks submission
  • How to use interactive playgrounds
  • How to complete and submit your work

Ready? Let's go!

📋 Track Your Progress with Objectives

Every lab has multiple objectives you need to complete. Different labs have different objectives based on what you'll learn:

  • Answer the mini quiz correctly
  • Complete interactive activities
  • Try different scenarios
  • Gather insights and explore concepts
Look for the 📋 badge in the bottom-right corner →

Your submission area is locked until all objectives are done. This ensures you learn before submitting!

🎮 Learn by Doing — Interactive Playgrounds

Each lab has interactive sections where you can:

  • Choose options — Select from encryption types, parameters, etc.
  • Adjust sliders — Change key length, block size, sensitivity
  • See results instantly — Outputs update as you experiment
  • Learn patterns — Understand trade-offs between choices

Don't worry about "wrong" answers — this is exploration! Try different combinations.

❓ Test Your Understanding with the Quiz

Each lab has a multiple-choice question to test what you've learned.

💡 Answers are randomized every time you reload — no guessing!
  • Read each option carefully
  • Think about what you observed in the playground
  • Click wrong answers after solving to see why they're incorrect

Getting it wrong is fine! You can try again, and explore all options.

📝 Share Your Learning in the Reflection

Once all objectives are complete, the submission area unlocks.

📌 Required: Learning Reflection

Share what you learned in your own words. How would you explain this to a friend? Why does it matter?

🔍 Optional: Lab Observations

Any interesting findings? Edge cases you discovered? Patterns you noticed?

Tip: Write thoughtfully — this reflection proves you understand the concept, not just completed activities.

📄 Export Your Work & Exit

When you're ready to finish:

  • Click "Export PDF" — Saves a summary of your work (quiz result, interactions, reflection)
  • See the success banner — Green notification appears at the bottom
  • Click "✕ Exit Lab" in the top bar to close when done
You can always return to previous labs — all your work is saved in the browser

One more thing: you can only navigate backward through labs. This ensures you don't skip ahead! 🔒

You can reopen this tour at any time via the ❓ Help button in the top bar.

Step 1 of 6