Skip to main content
Threat actor using a fishing rod to obtain information

the anatomy of a hack

CHAPTER 1: The Collector

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Auteurs de menaces utilisant une canne à pêche pour obtenir des informations

L’anatomie d’un piratage

CHAPITRE 1 : Le collectionneur

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Unsuspecting victim of cyber threats on their computer

the anatomy of a hack

CHAPTER 2: The In

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Victime sans méfiance de cybermenaces sur son ordinateur

L’anatomie d’un piratage

CHAPITRE 2: L’entrée

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Cyber security professionals fighting against threats

the anatomy of a hack

CHAPTER 3: The Set Up

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Professionnels de la cybersécurité luttant contre les menaces

L’anatomie d’un piratage

CHAPITRE 3: La mise en place

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
A person has been locked out of their computer

the anatomy of a hack

CHAPTER 4: The Long Game

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
  • Article
Une personne a été bloquée hors de son ordinateur

L’anatomie d’un piratage

CHAPITRE 4: La stratégie à long terme

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
  • Article
Man sitting at a desk with a computer and a target on him

the anatomy of a hack

Kick-off

  • Blog
  • Video
  • Quizzes
Un homme assis à un bureau avec un ordinateur et une cible sur lui

L’anatomie d’un piratage

Lancement

  • Blogues
  • Vidéo
  • Questionnaires

Knowledge Library

banner-image-csam-phishing

Bibliothèque des connaissances

banner-image-csam-phishing

Cyber Security Resources

Videos

Decorative banner image People gathering to seek knowledge on Cyber Security

RESSOURCES EN CYBERSÉCURITÉ

Vidéos

Decorative banner image People gathering to seek knowledge on Cyber Security
Cyber Security Resources / Knowledge Library / Category 1
Cyber Security Resources / Knowledge Library
Cyber Galaxy Defenders
{{tokens_earned}}
token
{{$t('messages.galaxy_tokens_earned')}}
{{tokens_earned}}
token
people on conference bell icon

New Year’s Cyber Security Games
Play Now

Play Game 1

Play Game 2

Jeux de cybersécurité du Nouvel An
joue maintenant

Jouez le jeu 1

Jouez le jeu 2

icon of girl using laptop
Are you sure you would like to cancel your request to attend Ontario’s Managing Digital Risks in the Broader Public Sector conference?

Êtes-vous certain(e) de vouloir annuler votre demande d’inscription à la conférence Gérer les risques numériques dans le secteur parapublic de l’Ontario?

You will no longer be registered for this event, and will no longer receive communications from us. If you opted to attend in-person, your name will be removed from the list. If you have already received the virtual attendance link, you will still be able to access the conference virtually.

Please note that you are unable to re-register for the in-person portion of the conference online. If you would like to re-register, or if you have any further inquiries, please contact cybersecurityconference@ontario.ca.

Thank you,
Ontario’s Cyber Security Education & Centre of Excellence Team

Vous n’êtes plus inscrit à cet événement et ne recevrez plus de communications de notre part. Si vous aviez choisi de participer en personne, votre nom sera supprimé de la liste. Si vous avez déjà reçu le lien de participation virtuelle, vous pourrez quand même accéder à la conférence de façon virtuelle.

Veuillez noter que vous ne pouvez pas vous inscrire de nouveau en ligne au volet en personne de la conférence. Si vous souhaitez vous inscrire de nouveau ou si vous avez d’autres questions, veuillez communiquer avec cybersecurityconference@ontario.ca.

Merci,
Équipe du Centre d’excellence et de formation de l’Ontario pour la cybersécurité

people on conference bell icon

Registration Status

You have requested to attend the Managing Digital Risks in the Broader Public Sector conference in-person. virtually.

Your status for the Managing Digital Risks in the Broader Public Sector conference is Approved Pending Approval Waitlisted Cancelled Denied


If you have any questions, please reach out to cybersecurityconference@ontario.ca.

Statut d’inscription

Vous avez demandé à assister à la conférence Gérer les risques numériques dans le secteur parapublic en personne. virtuellement.

Votre statut pour la conférence Gérer les risques numériques dans le secteur parapublic est Approuvé En attente d’approbation , Inscrit sur la liste d’attente Annulé Refusé


Si vous avez des questions, veuillez écrire à cybersecurityconference@ontario.ca.

Remarque
Veuillez noter que la version française des vidéos ne contient pas de voix off en français ; toutefois, une transcription en français est fournie pour référence.

Upcoming site outage for planned maintenance will begin on March 30th from 4:30 p.m. - 12:00 a.m. L’interruption du site prévues pour maintenance planifiée commencera le 30 mars de 16 h 30 à 12 h 00.

Cyber Security Ontario Cyber Security Ontario
  • English
    English Français
  • You are not logged in. (Log in)
  • Home
  • About us
  • Advisories
  • Expert Panel
  • Events
  • Resources
  • Home
  • Blogs
  • Videos
  • Quizzes
  • Knowledge Library
  • Learning Portal

Cyber Security Ontario Learning Portal

  1. Home
  2. Site pages
  3. Chris' Breach - Part Two

Chris' Breach, Part Two - Transcript

Narrator: At his desk, Chris receives a message from one of his co-workers advising him to take his social media post down. His co-worker explained that it contained a private company password and should not be shared. Chris gets more and more worried as he remembered that he did not recognize one of the accounts engaging with his posts. What if this unknown viewer had malicious intents? Chris decides to delete his posts and let the IT and Security Team know what has happened.

Anon: Wow, this guy really messed up. Seriously, Phish, this is going swimmingly. Let’s see, just from having his social media accounts set to public, I can already tell where he works and who he works with, as well some classified company information. Chris has led us to the jackpot! There's going to be some money in this one Phish. Let's just figure out how to set my traps.

Narrator: Feeling uneasy about what he had done, Chris watches some of the videos and completes the modules on CyberSecurityOntario.ca to improve his knowledge about cyber safety.

Vidéo: Understanding the type and value of the information managed by the organization is crucial to defining the types of protections needed. The information classification process involves considering legal and business requirements to protect the confidentiality of the information, as well as the harm and injury that may be caused by the information’s unauthorized access, manipulation, or inadvertent disclosure.

Narrator: Chris decides to implement some of the cyber safety tips he learned by reviewing Instagram’s privacy, security, and data collection policies, and turning his social media accounts private. He also decides to remove people he doesn’t know from his followers. He then decides to review his old posts to make sure there’s no sensitive information that shouldn’t have been shared online. Finally, Chris turns off his location services so that his social media apps can’t see his location. While he wishes he had known these security tips sooner, he also knows it’s never too late to start being cyber safe.

Narrator: Feeling much better after beginning to learn how to be cyber safe, Chris decides to send all of his co-workers a reminder on the importance of cyber security and keeping up to date with their cyber security awareness training. As someone who has now began to learn about cyber security, Chris is ready to work towards becoming a cyber defender not only for himself, but for those around him. Chris begins to turn into his superhero persona and spins up into the air.

Anon: Hmm, it looks like Chris has turned his profiles private. Well, that won’t stop me now! Thanks to using open-source intelligence gathering, I already have enough information about his coworkers and place of work that I can begin my first attack.

Phish: Open-source intelligence gathering is the process of collecting information from published or publicly available sources.

Anon: These names look familiar, this is definitely Chris’s team. Why just go after Chris when I could go after the entire organization. Get ready, Phish, I think this one’s going to be a hook, line, and sinker

Anon: Sorry, Phish, I didn’t mean it literally.

◄ Chris' Breach - Part One
Sachet Test (includes heartbeat) (hidden) ►
You are not logged in. (Log in)
Home
  • English
    • English
    • Français
Data retention summary
Get the mobile app
Supported by the Government of Ontario © King’s Printer for Ontario, 2012–23 | Terms of Use | AODA Inquiries
Soutenu par le gouvernement de l'Ontario © Imprimeur du Roi pour l’Ontario, 2012–23 | Conditions d’utilisation | Demandes de l'AODA
CSAM Supported by the Government of Ontario
© Queen's Printer for Ontario, 2012–21 | Terms of Use | AODA Inquiries
Cyber Security Awareness Month Footer Logo
CSAM Soutenu par le gouvernement de l'Ontario
© Imprimeur de la Reine pour l’Ontario, 2012‑21 | Conditions d’utilisation | Demandes de l'AODA
Logo de bas de page du mois de la sensibilisation à la cybersécurité