HTML Lab • Chapter 3 • Mastering Information Security

Hands‑On Lab: Core Principles of Information Security

This lab reinforces Chapter 3 using principle‑to‑decision mapping activities. Open locally in any browser.

Lab Orientation

40–70 minutes

Complete the activities in order. Your score is tracked locally in the browser (no data is sent anywhere).

0
Total Points
0/5
Activities Completed
Instructor Tip: Ask learners to justify answers. Focus on building the mental model, not memorization.

Activity 1 — CIA Trade‑offs

15 minutes • 20 pts

For a remote access system, propose 6 decisions and map each to CIA with trade‑offs.

Not checked yet.

Activity 2 — Authenticity, Non‑Repudiation, Digital Trust

10 minutes • 10 pts

Explain where you would use digital signatures and audit trails in the same system.

Not checked yet.

Activity 3 — AAA Flow

10 minutes • 10 pts

Describe Identification → Authentication → Authorization → Accounting.

Not checked yet.

Activity 4 — GRC vs ISMS vs Resilience

10 minutes • 10 pts

Map activities to Governance, Risk, Compliance, ISMS, and Resilience.

Not checked yet.

Activity 5 — ISMS Levels

10 minutes • 10 pts

List what belongs to Strategic vs Tactical vs Operational for your system.

Not checked yet.

Completion

Wrap‑up

Discuss: Where do organizations confuse management systems with technical controls?

Next step: Move to Chapter 4 (Information Security Guidance).