Skip to main content
Threat actor using a fishing rod to obtain information

the anatomy of a hack

CHAPTER 1: The Collector

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Auteurs de menaces utilisant une canne à pêche pour obtenir des informations

L’anatomie d’un piratage

CHAPITRE 1 : Le collectionneur

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Unsuspecting victim of cyber threats on their computer

the anatomy of a hack

CHAPTER 2: The In

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Victime sans méfiance de cybermenaces sur son ordinateur

L’anatomie d’un piratage

CHAPITRE 2: L’entrée

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Cyber security professionals fighting against threats

the anatomy of a hack

CHAPTER 3: The Set Up

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Professionnels de la cybersécurité luttant contre les menaces

L’anatomie d’un piratage

CHAPITRE 3: La mise en place

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
A person has been locked out of their computer

the anatomy of a hack

CHAPTER 4: The Long Game

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
  • Article
Une personne a été bloquée hors de son ordinateur

L’anatomie d’un piratage

CHAPITRE 4: La stratégie à long terme

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
  • Article
Man sitting at a desk with a computer and a target on him

the anatomy of a hack

Kick-off

  • Blog
  • Video
  • Quizzes
Un homme assis à un bureau avec un ordinateur et une cible sur lui

L’anatomie d’un piratage

Lancement

  • Blogues
  • Vidéo
  • Questionnaires

Knowledge Library

banner-image-csam-phishing

Bibliothèque des connaissances

banner-image-csam-phishing

Cyber Security Resources

Videos

Decorative banner image People gathering to seek knowledge on Cyber Security

RESSOURCES EN CYBERSÉCURITÉ

Vidéos

Decorative banner image People gathering to seek knowledge on Cyber Security
Cyber Security Resources / Knowledge Library / Category 1
Cyber Security Resources / Knowledge Library
Cyber Galaxy Defenders
{{tokens_earned}}
token
{{$t('messages.galaxy_tokens_earned')}}
{{tokens_earned}}
token
people on conference bell icon

New Year’s Cyber Security Games
Play Now

Play Game 1

Play Game 2

Jeux de cybersécurité du Nouvel An
joue maintenant

Jouez le jeu 1

Jouez le jeu 2

icon of girl using laptop
Are you sure you would like to cancel your request to attend Ontario’s Managing Digital Risks in the Broader Public Sector conference?

Êtes-vous certain(e) de vouloir annuler votre demande d’inscription à la conférence Gérer les risques numériques dans le secteur parapublic de l’Ontario?

You will no longer be registered for this event, and will no longer receive communications from us. If you opted to attend in-person, your name will be removed from the list. If you have already received the virtual attendance link, you will still be able to access the conference virtually.

Please note that you are unable to re-register for the in-person portion of the conference online. If you would like to re-register, or if you have any further inquiries, please contact cybersecurityconference@ontario.ca.

Thank you,
Ontario’s Cyber Security Education & Centre of Excellence Team

Vous n’êtes plus inscrit à cet événement et ne recevrez plus de communications de notre part. Si vous aviez choisi de participer en personne, votre nom sera supprimé de la liste. Si vous avez déjà reçu le lien de participation virtuelle, vous pourrez quand même accéder à la conférence de façon virtuelle.

Veuillez noter que vous ne pouvez pas vous inscrire de nouveau en ligne au volet en personne de la conférence. Si vous souhaitez vous inscrire de nouveau ou si vous avez d’autres questions, veuillez communiquer avec cybersecurityconference@ontario.ca.

Merci,
Équipe du Centre d’excellence et de formation de l’Ontario pour la cybersécurité

people on conference bell icon

Registration Status

You have requested to attend the Managing Digital Risks in the Broader Public Sector conference in-person. virtually.

Your status for the Managing Digital Risks in the Broader Public Sector conference is Approved Pending Approval Waitlisted Cancelled Denied


If you have any questions, please reach out to cybersecurityconference@ontario.ca.

Statut d’inscription

Vous avez demandé à assister à la conférence Gérer les risques numériques dans le secteur parapublic en personne. virtuellement.

Votre statut pour la conférence Gérer les risques numériques dans le secteur parapublic est Approuvé En attente d’approbation , Inscrit sur la liste d’attente Annulé Refusé


Si vous avez des questions, veuillez écrire à cybersecurityconference@ontario.ca.

Remarque
Veuillez noter que la version française des vidéos ne contient pas de voix off en français ; toutefois, une transcription en français est fournie pour référence.

Upcoming site outage for planned maintenance will begin on March 30th from 4:30 p.m. - 12:00 a.m. L’interruption du site prévues pour maintenance planifiée commencera le 30 mars de 16 h 30 à 12 h 00.

Cyber Security Ontario Cyber Security Ontario
  • English
    English Français
  • You are not logged in. (Log in)
  • Home
  • About us
  • Advisories
  • Expert Panel
  • Events
  • Resources
  • Home
  • Blogs
  • Videos
  • Quizzes
  • Knowledge Library
  • Learning Portal

Cyber Security Ontario Learning Portal

  1. Home
  2. Site pages
  3. Chris' Breach - Part One

Chris' Breach, Part One - Transcript

Narrator: It’s the night before Chris’s first day of his new job at a healthcare facility. Wanting to let his friends know about his cool new job, Chris decides to update his LinkedIn account and profile picture.

Elsewhere in Anon's supervillain lair...

Anon: Now that I finished my last cyber attack, it’s time for me to look for a new target. I need to find something that will really make a splash. Hmmm, maybe like a public service organization.

Narrator: Chris has had a great first morning of work and decides to take a break at lunch and check his social media. He notices so many friends have sent him a message wishing him a great first day and he shares how his day is going. Chris poses for a selfie at his desk to show his office set up. Wanting to get more followers on his account, Chris also decides to tag some of his new co-workers he met this morning.

Narrator: After lunch, Chris gets back to work and receives an email informing that he has been given approval to access the healthcare electronic record management app with the login information attached. Chuckling to himself, he realizes the healthcare facility uses the password “Imscaredofneedles123” for the application. Wanting to make his friends laugh, Chris decides to post a story on his public Instagram account showing off the password to all of his followers using the hashtag #Passwordproblems.

Narrator: Chris’s phone begins to buzz as he receives incoming messages from his friends laughing at the story he posted. But suddenly, Chris notices that someone he does not know has seen the story-

Chris: .. who is Anon?

Narrator: Chris notices Anon liked the photo he had posted earlier in the day. Chris begins to worry that someone he doesn’t know has come across his profile...

Chris: This could be very bad...

Anon: Oh, Phish. No one seems to be posting anything good for me to get my hands on. Let me check some hashtags to see if I can find some revealing information. Oh.... very interesting. Oh ho ho ho. Our friend Chris has made some very big mistakes. Look, I found my next victim....

◄ TTX registration (hidden)
Chris' Breach - Part Two ►
You are not logged in. (Log in)
Home
  • English
    • English
    • Français
Data retention summary
Get the mobile app
Supported by the Government of Ontario © King’s Printer for Ontario, 2012–23 | Terms of Use | AODA Inquiries
Soutenu par le gouvernement de l'Ontario © Imprimeur du Roi pour l’Ontario, 2012–23 | Conditions d’utilisation | Demandes de l'AODA
CSAM Supported by the Government of Ontario
© Queen's Printer for Ontario, 2012–21 | Terms of Use | AODA Inquiries
Cyber Security Awareness Month Footer Logo
CSAM Soutenu par le gouvernement de l'Ontario
© Imprimeur de la Reine pour l’Ontario, 2012‑21 | Conditions d’utilisation | Demandes de l'AODA
Logo de bas de page du mois de la sensibilisation à la cybersécurité