Confidentiality, Integrity, Availability — Understanding public key cryptography and password security
Scenario: You're a cybersecurity analyst for a financial institution. Your job is to protect customer data using the three pillars of information security. Understanding these fundamentals will help you implement proper authentication and encryption systems.
Click on each pillar to explore how it protects information:
Select a CIA pillar above to see detailed examples and threats
🎯 CIA Threat Simulator
📌 Scenario
You're a developer who needs to give a teammate remote access to a production server — without ever emailing them a password. You also need to encrypt customer records at rest as fast as possible. These two problems require different types of cryptography. Understanding when to use symmetric vs asymmetric encryption is one of the most practical skills in cybersecurity.
💡 Why this matters in practice
Use Symmetric when:
Use Asymmetric when:
🔐 Real-world example: HTTPS uses asymmetric encryption (RSA/ECDH) only to exchange a temporary symmetric key, then switches to AES for the rest of the session — getting the best of both worlds.
🖥️ Try it yourself — Generate Your Own Key Pair
Your browser detected you're on . The correct commands are pre-selected below. Open your terminal and run them to create a real RSA key pair.
Terminal, press Enter📸 Upload Your Terminal Screenshot
After running the commands above, take a screenshot of your terminal showing both the public and private key output. Upload it here as proof of completion.
Authentication: Passwords verify "you are who you say you are"
Without authentication, anyone could access your accounts, files, and sensitive information.
🧪 Password Generator Task
Use a password generator to create three passwords — one for each strength level — then paste them in the fields below. Each field will validate your entry and show you the estimated crack time.
Short password — under 8 characters (e.g. hello123)
Mix of letters & numbers, 8–11 characters (e.g. Coffee2024)
12+ characters with uppercase, lowercase, numbers & symbols (e.g. T!ger$8x#Mango)
⚠️ Password Vulnerabilities
❓ Which CIA principle is MOST violated when an attacker intercepts and reads your encrypted email without authorization?
After interacting with the CIA triad, public key concepts, and password strength tools, reflect on your learning:
🔒 Complete all objectives (tracker bottom-right ↘) to unlock submission
Was there anything within the lab you expected to change, but didn't?
The CIA Triad forms the foundation of all cybersecurity practices:
Public key cryptography solves the key distribution problem, enabling secure communication over insecure channels. Strong authentication (passwords, multi-factor auth) ensures only authorized users access protected systems.
Cybersecurity Lab Submission
| Student: | |
| Opened: | |
| Submitted: | |
| Time on page: |
Let's take a quick tour of how these labs work. By the end, you'll understand:
Ready? Let's go!
Every lab has multiple objectives you need to complete. Different labs have different objectives based on what you'll learn:
Your submission area is locked until all objectives are done. This ensures you learn before submitting!
Each lab has interactive sections where you can:
Don't worry about "wrong" answers — this is exploration! Try different combinations.
Each lab has a multiple-choice question to test what you've learned.
Getting it wrong is fine! You can try again, and explore all options.
Once all objectives are complete, the submission area unlocks.
📌 Required: Learning Reflection
Share what you learned in your own words. How would you explain this to a friend? Why does it matter?
🔍 Optional: Lab Observations
Any interesting findings? Edge cases you discovered? Patterns you noticed?
Tip: Write thoughtfully — this reflection proves you understand the concept, not just completed activities.
When you're ready to finish:
One more thing: you can only navigate backward through labs. This ensures you don't skip ahead! 🔒
You can reopen this tour at any time via the ❓ Help button in the top bar.