Skip to main content
Threat actor using a fishing rod to obtain information

the anatomy of a hack

CHAPTER 1: The Collector

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Auteurs de menaces utilisant une canne à pêche pour obtenir des informations

L’anatomie d’un piratage

CHAPITRE 1 : Le collectionneur

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Unsuspecting victim of cyber threats on their computer

the anatomy of a hack

CHAPTER 2: The In

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Victime sans méfiance de cybermenaces sur son ordinateur

L’anatomie d’un piratage

CHAPITRE 2: L’entrée

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
Cyber security professionals fighting against threats

the anatomy of a hack

CHAPTER 3: The Set Up

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
Professionnels de la cybersécurité luttant contre les menaces

L’anatomie d’un piratage

CHAPITRE 3: La mise en place

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
A person has been locked out of their computer

the anatomy of a hack

CHAPTER 4: The Long Game

  • Graphic Novel
  • Blog
  • Video
  • Quizzes
  • Article
Une personne a été bloquée hors de son ordinateur

L’anatomie d’un piratage

CHAPITRE 4: La stratégie à long terme

  • Roman graphique
  • Blogues
  • Vidéo
  • Questionnaires
  • Article
Man sitting at a desk with a computer and a target on him

the anatomy of a hack

Kick-off

  • Blog
  • Video
  • Quizzes
Un homme assis à un bureau avec un ordinateur et une cible sur lui

L’anatomie d’un piratage

Lancement

  • Blogues
  • Vidéo
  • Questionnaires

Knowledge Library

banner-image-csam-phishing

Bibliothèque des connaissances

banner-image-csam-phishing

Cyber Security Resources

Videos

Decorative banner image People gathering to seek knowledge on Cyber Security

RESSOURCES EN CYBERSÉCURITÉ

Vidéos

Decorative banner image People gathering to seek knowledge on Cyber Security
Cyber Security Resources / Knowledge Library / Category 1
Cyber Security Resources / Knowledge Library
Cyber Galaxy Defenders
{{tokens_earned}}
token
{{$t('messages.galaxy_tokens_earned')}}
{{tokens_earned}}
token
people on conference bell icon

New Year’s Cyber Security Games
Play Now

Play Game 1

Play Game 2

Jeux de cybersécurité du Nouvel An
joue maintenant

Jouez le jeu 1

Jouez le jeu 2

icon of girl using laptop
Are you sure you would like to cancel your request to attend Ontario’s Managing Digital Risks in the Broader Public Sector conference?

Êtes-vous certain(e) de vouloir annuler votre demande d’inscription à la conférence Gérer les risques numériques dans le secteur parapublic de l’Ontario?

You will no longer be registered for this event, and will no longer receive communications from us. If you opted to attend in-person, your name will be removed from the list. If you have already received the virtual attendance link, you will still be able to access the conference virtually.

Please note that you are unable to re-register for the in-person portion of the conference online. If you would like to re-register, or if you have any further inquiries, please contact cybersecurityconference@ontario.ca.

Thank you,
Ontario’s Cyber Security Education & Centre of Excellence Team

Vous n’êtes plus inscrit à cet événement et ne recevrez plus de communications de notre part. Si vous aviez choisi de participer en personne, votre nom sera supprimé de la liste. Si vous avez déjà reçu le lien de participation virtuelle, vous pourrez quand même accéder à la conférence de façon virtuelle.

Veuillez noter que vous ne pouvez pas vous inscrire de nouveau en ligne au volet en personne de la conférence. Si vous souhaitez vous inscrire de nouveau ou si vous avez d’autres questions, veuillez communiquer avec cybersecurityconference@ontario.ca.

Merci,
Équipe du Centre d’excellence et de formation de l’Ontario pour la cybersécurité

people on conference bell icon

Registration Status

You have requested to attend the Managing Digital Risks in the Broader Public Sector conference in-person. virtually.

Your status for the Managing Digital Risks in the Broader Public Sector conference is Approved Pending Approval Waitlisted Cancelled Denied


If you have any questions, please reach out to cybersecurityconference@ontario.ca.

Statut d’inscription

Vous avez demandé à assister à la conférence Gérer les risques numériques dans le secteur parapublic en personne. virtuellement.

Votre statut pour la conférence Gérer les risques numériques dans le secteur parapublic est Approuvé En attente d’approbation , Inscrit sur la liste d’attente Annulé Refusé


Si vous avez des questions, veuillez écrire à cybersecurityconference@ontario.ca.

Remarque
Veuillez noter que la version française des vidéos ne contient pas de voix off en français ; toutefois, une transcription en français est fournie pour référence.

Upcoming site outage for planned maintenance will begin on March 30th from 4:30 p.m. - 12:00 a.m. L’interruption du site prévues pour maintenance planifiée commencera le 30 mars de 16 h 30 à 12 h 00.

Cyber Security Ontario Cyber Security Ontario
  • English
    English Français
  • You are not logged in. (Log in)
  • Home
  • About us
  • Advisories
  • Expert Panel
  • Events
  • Resources
  • Home
  • Blogs
  • Videos
  • Quizzes
  • Knowledge Library
  • Learning Portal

Cyber Security Ontario Learning Portal

  1. Home
  2. Site pages
  3. Dan to the Defence - Part Two

Dan to the Defence - Part Two - Transcript

Narrator: While going through Cindy's and Chris' emails, Dan begins receiving hundreds of alerts from his monitoring tools. Dan notices that there are hundreds of failed login attempts across the organization. Dan recognizes that this may be a sign of a potential problem and gets ready to jump on the defence.

Dan recalls his cyber security awareness training, where he learned that hackers could use breached passwords purchased from the Dark Web to log in to other accounts. Worried about what could happen, Dan decides to send a company wide email alerting his co-workers of the attempted cyber attacks and reminding them about proper password hygiene. Dan recommends in the email that all his coworkers change their passwords immediately and reminds them not to use the same password from multiple accounts. He also encourages his co-workers to ensure their password is complex, using letters, numbers and symbols, and that the password is a decent length. Finally, he reminds everyone to strengthen their account security with multi-factor authentication.

After sharing his advice with his coworkers. Dan transforms into a cyber security defender. He is prepared to take on any challenges that are thrown his way and is committed to learn more about cyber security awareness and spreading his knowledge.

Anon: Ahhh... One of these passwords better work Phish. I want to get my hands on the information inside this organization. Wait... the screen is flashing green. YAHOO!!! I did it! One of the passwords finally worked. Time to get into the network... What the? NO! These employees are too tricky! This one as MFA set up so I can't get into the account. You know, Phish, this was the final straw… Not plastic, of course, I know you hate those. I will get into the network if it's the last thing I do. Time to plot my final attack...

◄ Dan to the Defence - Part One
CSAM 2022 Defend the Crown (Week 3) ►
You are not logged in. (Log in)
Home
  • English
    • English
    • Français
Data retention summary
Get the mobile app
Supported by the Government of Ontario © King’s Printer for Ontario, 2012–23 | Terms of Use | AODA Inquiries
Soutenu par le gouvernement de l'Ontario © Imprimeur du Roi pour l’Ontario, 2012–23 | Conditions d’utilisation | Demandes de l'AODA
CSAM Supported by the Government of Ontario
© Queen's Printer for Ontario, 2012–21 | Terms of Use | AODA Inquiries
Cyber Security Awareness Month Footer Logo
CSAM Soutenu par le gouvernement de l'Ontario
© Imprimeur de la Reine pour l’Ontario, 2012‑21 | Conditions d’utilisation | Demandes de l'AODA
Logo de bas de page du mois de la sensibilisation à la cybersécurité