Scenario: You want stronger MFA for email. Which is the most robust option?
identityScenario: A transaction value is changed in transit without detection. Which CIA principle failed?
basicsScenario: You assume password hashes will leak one day. What should you use for password storage?
cryptoScenario: A colleague receives an urgent invoice link. What is the safest first action?
phishingScenario: You must store sensitive data at rest. What is the defensible first step?
basicsScenario: An admin account is shared by a whole team. What is the main security failure?
identityScenario: An attacker reads data they should not. Which principle failed first?
basicsWhat makes a security control 'defensible'?
governanceScenario: A user’s session keeps working after password reset. What is the most likely missing control?
identityScenario: A service is down because of a DDoS. What is the CIA principle impacted most directly?
basicsScenario: You must reduce phishing risk quickly. Which control is most effective at scale?
phishingScenario: A team wants to invent a new encryption scheme. What is the most defensible response?
crypto