00 Days 00 Hours 00 Mins until CSAM ends!
The knowledge library is a collection of articles that introduces important cyber security topics.
The Anatomy of a Hack
During CSAM, we will explore how a well-organized cyber attack unfolds to create a widespread disruption of critical organizational services and how you and your organization can stay cyber safe. Each week, we will learn about a different topic in cyber security through our graphic novel, The Anatomy of the Hack, blog posts, videos and quizzes. Follow along weekly for new material!
Chapter 2: The In
In The Anatomy of a Hack the story continues with the threat actors attempting to avoid detection and exploit vulnerabilities on the Health Care Agency. In this week’s materials, we will learn about why strong passwords are important and how threat actors can take advantage of weak passwords.
Chapter 3: The Set Up
In The Anatomy of the Hack, the threat actors begin to deploy malware packages throughout the network. The organizational IT and Security team attempts to thwart the attacks. In this week’s materials, we will learn about good cyber hygiene and what steps you can take to improve your digital habits.
Chapter 4: The Long Game
In The Anatomy of the Hack is the conclusion of our story. The activated ransomware disrupts organizational services and the threat actor begins exfiltrating data and demands a ransom payment. In this week’s materials, we will bring together what we have learned to explore how a cyber attack comes together.
Ransomware Evolved: New Forms of Attack
What is ransomware? How can you prevent a ransomware attack? Learn more about ransomware in this week’s article written in partnership with the Ontario Provincial Police (OPP).