{"metadata":{"generator":"Captivate","generatorVersion":"11.5.1","schemaVersion":"","author":"author","title":"CyberSecurityDraft_Blue_Part1","description":"project description","email":"","website":"","tags":"","thumbnail":"","source":"assets","durationInFrames":99039,"frameRate":30,"totalSlides":57,"width":1280,"height":720,"responsive":false,"scalable":true,"launchFile":"index_scorm.html","isVRProject":false},"contentStructure":[{"id":"Click_Box_1","class":"TODO::Senthil","instance":"Click_Box_1","roles":{"click":{"subtype":"button"}}},{"id":"Slide5836","class":"PPTX Slide","instance":"Cybersecurity ","thumbnail":"","children":["Click_Box_1"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide5836"}}},{"id":"Click_Box_2","class":"TODO::Senthil","instance":"Click_Box_2","roles":{"click":{"subtype":"button"}}},{"id":"Slide5852","class":"PPTX Slide","instance":"Cybersecurity ","thumbnail":"","children":["Click_Box_2"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide5852"}}},{"id":"Click_Box_3","class":"TODO::Senthil","instance":"Click_Box_3","roles":{"click":{"subtype":"button"}}},{"id":"Slide5868","class":"PPTX Slide","instance":"Welcome ","thumbnail":"","children":["Click_Box_3"],"roles":{"slide":{"durationInFrames":1071},"navigation":{"navid":"Slide5868"}}},{"id":"Click_Box_4","class":"TODO::Senthil","instance":"Click_Box_4","roles":{"click":{"subtype":"button"}}},{"id":"Slide5884","class":"PPTX Slide","instance":"About the Course ","thumbnail":"","children":["Click_Box_4"],"roles":{"slide":{"durationInFrames":717},"navigation":{"navid":"Slide5884"}}},{"id":"Click_Box_5","class":"TODO::Senthil","instance":"Click_Box_5","roles":{"click":{"subtype":"button"}}},{"id":"Slide5900","class":"PPTX Slide","instance":"About the Course ","thumbnail":"","children":["Click_Box_5"],"roles":{"slide":{"durationInFrames":675},"navigation":{"navid":"Slide5900"}}},{"id":"Click_Box_6","class":"TODO::Senthil","instance":"Click_Box_6","roles":{"click":{"subtype":"button"}}},{"id":"Slide5916","class":"PPTX Slide","instance":"Course Assessment ","thumbnail":"","children":["Click_Box_6"],"roles":{"slide":{"durationInFrames":663},"navigation":{"navid":"Slide5916"}}},{"id":"Click_Box_7","class":"TODO::Senthil","instance":"Click_Box_7","roles":{"click":{"subtype":"button"}}},{"id":"Slide5932","class":"PPTX Slide","instance":"Sign Off ","thumbnail":"","children":["Click_Box_7"],"roles":{"slide":{"durationInFrames":492},"navigation":{"navid":"Slide5932"}}},{"id":"Click_Box_8","class":"TODO::Senthil","instance":"Click_Box_8","roles":{"click":{"subtype":"button"}}},{"id":"Slide5948","class":"PPTX Slide","instance":"Cybersecurity Awareness ","thumbnail":"","children":["Click_Box_8"],"roles":{"slide":{"durationInFrames":2313},"navigation":{"navid":"Slide5948"}}},{"id":"Click_Box_10","class":"TODO::Senthil","instance":"Click_Box_10","roles":{"click":{"subtype":"button"}}},{"id":"Slide5980","class":"PPTX Slide","instance":"Cybersecurity Program ","thumbnail":"","children":["Click_Box_10"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide5980"}}},{"id":"Click_Box_11","class":"TODO::Senthil","instance":"Click_Box_11","roles":{"click":{"subtype":"button"}}},{"id":"Slide5996","class":"PPTX Slide","instance":"Purpose ","thumbnail":"","children":["Click_Box_11"],"roles":{"slide":{"durationInFrames":765},"navigation":{"navid":"Slide5996"}}},{"id":"Click_Box_12","class":"TODO::Senthil","instance":"Click_Box_12","roles":{"click":{"subtype":"button"}}},{"id":"Slide6012","class":"PPTX Slide","instance":"Slide 12","thumbnail":"","children":["Click_Box_12"],"roles":{"slide":{"durationInFrames":969},"navigation":{"navid":"Slide6012"}}},{"id":"Click_Box_14","class":"TODO::Senthil","instance":"Click_Box_14","roles":{"click":{"subtype":"button"}}},{"id":"Slide6044","class":"PPTX Slide","instance":"Self-Check ","thumbnail":"","children":["Click_Box_14"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6044"}}},{"id":"Image_20","class":"TODO::Senthil","instance":"Image_20","roles":{"click":{"subtype":"button","question":"Slide11009q0"},"textData":{}}},{"id":"si10810","class":"TODO::Senthil","instance":"Text_Caption_1","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si10822","class":"TODO::Senthil","instance":"Text_Caption_2","title":"What is a computer network? ","roles":{"textData":{}}},{"id":"si10878","class":"TODO::Senthil","instance":"9","roles":{}},{"id":"si10834","class":"TODO::Senthil","instance":"Text_Caption_3","title":" ","roles":{"textData":{}}},{"id":"si10838","class":"TODO::Senthil","instance":"Text_Caption_4","title":"A super-computer owned by the government ","roles":{"textData":{}}},{"id":"si10834_a","class":"TODO::Senthil","instance":"2","roles":{"answer":{"title":"A super-computer owned by the government\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si10845","class":"TODO::Senthil","instance":"Text_Caption_5","title":" ","roles":{"textData":{}}},{"id":"si10849","class":"TODO::Senthil","instance":"Text_Caption_6","title":"A web of connected computers and devices ","roles":{"textData":{}}},{"id":"si10845_a","class":"TODO::Senthil","instance":"4","roles":{"answer":{"title":"A web of connected computers and devices\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si10856","class":"TODO::Senthil","instance":"Text_Caption_7","title":" ","roles":{"textData":{}}},{"id":"si10860","class":"TODO::Senthil","instance":"Text_Caption_8","title":"Internet service providers ","roles":{"textData":{}}},{"id":"si10856_a","class":"TODO::Senthil","instance":"6","roles":{"answer":{"title":"Internet service providers\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si10867","class":"TODO::Senthil","instance":"Text_Caption_9","title":" ","roles":{"textData":{}}},{"id":"si10871","class":"TODO::Senthil","instance":"Text_Caption_10","title":"A security threat ","roles":{"textData":{}}},{"id":"si10867_a","class":"TODO::Senthil","instance":"8","roles":{"answer":{"title":"A security threat\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si10939","class":"TODO::Senthil","instance":"Button_1","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11009q0","for":"Slide11009q0"},"textData":{}}},{"id":"si10951","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11009q0","for":"Slide11009q0"},"textData":{}}},{"id":"si10963","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11009q0","for":"Slide11009q0"},"textData":{}}},{"id":"si10909","class":"TODO::Senthil","instance":"SmartShape_1","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide11009q0"},"textData":{}}},{"id":"si10995","class":"TODO::Senthil","instance":"SmartShape_3","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide11009q0"},"textData":{}}},{"id":"si32374","class":"TODO::Senthil","title":"Correct Answer: A web of connected computers and devices Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide11009q0"},"textData":{}}},{"id":"Slide11009","class":"Question Slide","instance":"","thumbnail":"","children":["Image_20","si10810","si10822","si10838","si10849","si10860","si10871","si10939","si10951","si10963","si10909"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide11009"},"question":{"interactionId":"10783","quizId":379,"title":"Knowledge Check #1\r","text":"What is a computer network?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["2"]}}},{"id":"Image_21","class":"TODO::Senthil","instance":"Image_21","roles":{"click":{"subtype":"button","question":"Slide11258q1"},"textData":{}}},{"id":"si11059","class":"TODO::Senthil","instance":"Text_Caption_11","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si11071","class":"TODO::Senthil","instance":"Text_Caption_12","title":"Why will cybersecurity always be a concern? ","roles":{"textData":{}}},{"id":"si11127","class":"TODO::Senthil","instance":"1_10","roles":{}},{"id":"si11083","class":"TODO::Senthil","instance":"Text_Caption_13","title":" ","roles":{"textData":{}}},{"id":"si11087","class":"TODO::Senthil","instance":"Text_Caption_14","title":"Because the Internet will never go away ","roles":{"textData":{}}},{"id":"si11083_a","class":"TODO::Senthil","instance":"2_9","roles":{"answer":{"title":"Because the Internet will never go away\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11094","class":"TODO::Senthil","instance":"Text_Caption_15","title":" ","roles":{"textData":{}}},{"id":"si11098","class":"TODO::Senthil","instance":"Text_Caption_16","title":"Because other countries will want what we have ","roles":{"textData":{}}},{"id":"si11094_a","class":"TODO::Senthil","instance":"4_10","roles":{"answer":{"title":"Because other countries will want what we have\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11105","class":"TODO::Senthil","instance":"Text_Caption_17","title":" ","roles":{"textData":{}}},{"id":"si11109","class":"TODO::Senthil","instance":"Text_Caption_18","title":"Criminals need them to steal identities ","roles":{"textData":{}}},{"id":"si11105_a","class":"TODO::Senthil","instance":"6_11","roles":{"answer":{"title":"Criminals need them to steal identies\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11116","class":"TODO::Senthil","instance":"Text_Caption_19","title":" ","roles":{"textData":{}}},{"id":"si11120","class":"TODO::Senthil","instance":"Text_Caption_20","title":"It is a side effect of Internet communication and linked systems ","roles":{"textData":{}}},{"id":"si11116_a","class":"TODO::Senthil","instance":"8_12","roles":{"answer":{"title":"It is a side effect of Internet communication and linked systems\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11188","class":"TODO::Senthil","instance":"Button_2","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11258q1","for":"Slide11258q1"},"textData":{}}},{"id":"si11200","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11258q1","for":"Slide11258q1"},"textData":{}}},{"id":"si11212","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11258q1","for":"Slide11258q1"},"textData":{}}},{"id":"si11158","class":"TODO::Senthil","instance":"SmartShape_4","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide11258q1"},"textData":{}}},{"id":"si11244","class":"TODO::Senthil","instance":"SmartShape_6","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide11258q1"},"textData":{}}},{"id":"si32361","class":"TODO::Senthil","title":"Correct Answer: It is a side effect of Internet communications and links systems. Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide11258q1"},"textData":{}}},{"id":"Slide11258","class":"Question Slide","instance":"","thumbnail":"","children":["Image_21","si11059","si11071","si11087","si11098","si11109","si11120","si11188","si11200","si11212","si11158"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide11258"},"question":{"interactionId":"11032","quizId":379,"title":"Knowledge Check #1\r","text":"Why will cybersecurity always be a concern?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["4"]}}},{"id":"Image_22","class":"TODO::Senthil","instance":"Image_22","roles":{"click":{"subtype":"button","question":"Slide11614q2"},"question":{"interactionId":"31451","quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si11333","class":"TODO::Senthil","instance":"Text_Caption_21","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si11345","class":"TODO::Senthil","instance":"Text_Caption_22","title":"The following terms are fundamental to any cybersecurity program. Can you match them to their corresponding definitions? ","roles":{"textData":{}}},{"id":"Text_Caption_24","class":"TODO::Senthil","instance":"Text_Caption_24","title":"e ","roles":{"textData":{}}},{"id":"Text_Caption_25","class":"TODO::Senthil","instance":"Text_Caption_25","title":"Cybersecurity event ","roles":{"textData":{}}},{"id":"Text_Caption_26","class":"TODO::Senthil","instance":"Text_Caption_26","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_27","class":"TODO::Senthil","instance":"Text_Caption_27","title":"Cybersecurity risk ","roles":{"textData":{}}},{"id":"Text_Caption_28","class":"TODO::Senthil","instance":"Text_Caption_28","title":"d ","roles":{"textData":{}}},{"id":"Text_Caption_29","class":"TODO::Senthil","instance":"Text_Caption_29","title":"Integrity ","roles":{"textData":{}}},{"id":"Text_Caption_30","class":"TODO::Senthil","instance":"Text_Caption_30","title":"b ","roles":{"textData":{}}},{"id":"Text_Caption_31","class":"TODO::Senthil","instance":"Text_Caption_31","title":"Nonpublic information ","roles":{"textData":{}}},{"id":"Text_Caption_32","class":"TODO::Senthil","instance":"Text_Caption_32","title":"c ","roles":{"textData":{}}},{"id":"Text_Caption_33","class":"TODO::Senthil","instance":"Text_Caption_33","title":"Information system ","roles":{"textData":{}}},{"id":"si11423","class":"TODO::Senthil","instance":"Text_Caption_35","title":"a. ","roles":{"textData":{}}},{"id":"si11427","class":"TODO::Senthil","instance":"Text_Caption_36","title":"The potential that a given threat will exploit vulnerabilities of an information system and thereby cause harm to the organization ","roles":{"textData":{}}},{"id":"si11427ans","class":"TODO::Senthil","roles":{"answer":{"title":"The potential that a given threat will exploit vulnerabilities of an information sysem and thereby cause harm to the organization","index":"Not implemented"}}},{"id":"si11433","class":"TODO::Senthil","instance":"Text_Caption_37","title":"b. ","roles":{"textData":{}}},{"id":"si11437","class":"TODO::Senthil","instance":"Text_Caption_38","title":"Electronic information that is not publicly available ","roles":{"textData":{}}},{"id":"si11437ans","class":"TODO::Senthil","roles":{"answer":{"title":"Electronic information that is not publicly available","index":"Not implemented"}}},{"id":"si11443","class":"TODO::Senthil","instance":"Text_Caption_39","title":"c. ","roles":{"textData":{}}},{"id":"si11447","class":"TODO::Senthil","instance":"Text_Caption_40","title":"A set of electronic information resources that are established for the collection, processing, maintenance, use, sharing, dissemination, and/or disposition of electronic information ","roles":{"textData":{}}},{"id":"si11447ans","class":"TODO::Senthil","roles":{"answer":{"title":"A set of electronic information resources that are established for the collection, processing, maintenance, use, sharing, dissemination, and/or disposition of electronic information","index":"Not implemented"}}},{"id":"si11453","class":"TODO::Senthil","instance":"Text_Caption_41","title":"d. ","roles":{"textData":{}}},{"id":"si11457","class":"TODO::Senthil","instance":"Text_Caption_42","title":"The condition of accuracy and completeness ","roles":{"textData":{}}},{"id":"si11457ans","class":"TODO::Senthil","roles":{"answer":{"title":"The condition of accuracy and completeness","index":"Not implemented"}}},{"id":"si11463","class":"TODO::Senthil","instance":"Text_Caption_43","title":"e. ","roles":{"textData":{}}},{"id":"si11467","class":"TODO::Senthil","instance":"Text_Caption_44","title":"An attempt to disrupt, misuse, or gain unauthorized access to an information system ","roles":{"textData":{}}},{"id":"si11467ans","class":"TODO::Senthil","roles":{"answer":{"title":"An attempt to disrupt, misuse, or gain unauthorized access to an information system","index":"Not implemented"}}},{"id":"si11540","class":"TODO::Senthil","instance":"Button_3","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11614q2","for":"Slide11614q2"},"textData":{}}},{"id":"si11552","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11614q2","for":"Slide11614q2"},"textData":{}}},{"id":"si11564","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11614q2","for":"Slide11614q2"},"textData":{}}},{"id":"si11510","class":"TODO::Senthil","instance":"SmartShape_7","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide11614q2"},"textData":{}}},{"id":"si11600","class":"TODO::Senthil","instance":"SmartShape_9","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide11614q2"},"textData":{}}},{"id":"si32387","class":"TODO::Senthil","title":"Correct Answer: Cybersecurity event - An attempt to disrupt, misuse, or gain unauthorized access to an information system Cybersecurity risk - The potential that a given threat will exploit vulnerabilities of an information system and thereby cause harm to the organization Integrity - The condition of accuracy and completeness Nonpublic information - Electronic information that is not publicly available Information system - A set of electronic information resources that are established for the collection, processing, maintenance, use, sharing, dissemination, and/or disposition of electronic information Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide11614q2"},"textData":{}}},{"id":"Slide11614","class":"Question Slide","instance":"","thumbnail":"","children":["Image_22","si11333","si11345","si11427","si11437","si11447","si11457","si11467","si11540","si11552","si11564","si11510"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide11614"},"question":{"interactionId":"11270","quizId":379,"title":"Knowledge Check #1\r","text":"The following terms are fundamental to any cybersecurity program. Can you match them to their corresponding definitions? \r","type":"knowledgeCheck","ikc":true,"interactionType":"matching","ramdomized":true,"correctAnswers":[]}}},{"id":"Image_23","class":"TODO::Senthil","instance":"Image_23","roles":{"click":{"subtype":"button","question":"Slide11848q3"},"question":{"interactionId":"31463","quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si11660","class":"TODO::Senthil","instance":"Text_Caption_45","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si11672","class":"TODO::Senthil","instance":"Text_Caption_46","title":"What are the CIS 20 best practices? ","roles":{"textData":{}}},{"id":"si11717","class":"TODO::Senthil","instance":"1_11","roles":{}},{"id":"si11684","class":"TODO::Senthil","instance":"Text_Caption_47","title":" ","roles":{"textData":{}}},{"id":"si11688","class":"TODO::Senthil","instance":"Text_Caption_48","title":"A cybersecurity awareness program based on recommendation from employees ","roles":{"textData":{}}},{"id":"si11684_a","class":"TODO::Senthil","instance":"2_13","roles":{"answer":{"title":"A cybersecurity awareness program based on recommendation from employees\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11695","class":"TODO::Senthil","instance":"Text_Caption_49","title":" ","roles":{"textData":{}}},{"id":"si11699","class":"TODO::Senthil","instance":"Text_Caption_50","title":"A series of 20 do’s and don’ts from Norton Security ","roles":{"textData":{}}},{"id":"si11695_a","class":"TODO::Senthil","instance":"4_14","roles":{"answer":{"title":"A series of 20 do’s and don’ts from Norton Security\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11706","class":"TODO::Senthil","instance":"Text_Caption_51","title":" ","roles":{"textData":{}}},{"id":"si11710","class":"TODO::Senthil","instance":"Text_Caption_52","title":"A cybersecurity awareness program based on the Center for Internet Security (CIS) Top 20 Critical Security best practices ","roles":{"textData":{}}},{"id":"si11706_a","class":"TODO::Senthil","instance":"6_15","roles":{"answer":{"title":"A cybersecurity awareness program based on the Center for Internet Security (CIS) Top 20 Critical Security best practices\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11778","class":"TODO::Senthil","instance":"Button_4","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11848q3","for":"Slide11848q3"},"textData":{}}},{"id":"si11790","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11848q3","for":"Slide11848q3"},"textData":{}}},{"id":"si11802","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11848q3","for":"Slide11848q3"},"textData":{}}},{"id":"si11748","class":"TODO::Senthil","instance":"SmartShape_10","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide11848q3"},"textData":{}}},{"id":"si11834","class":"TODO::Senthil","instance":"SmartShape_12","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide11848q3"},"textData":{}}},{"id":"si32400","class":"TODO::Senthil","title":" Correct Answer: A cybersecurity awareness program based on the Center for Internet Security (CIS) Top 20 Critical Security best practices Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide11848q3"},"textData":{}}},{"id":"Slide11848","class":"Question Slide","instance":"","thumbnail":"","children":["Image_23","si11660","si11672","si11688","si11699","si11710","si11778","si11790","si11802","si11748"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide11848"},"question":{"interactionId":"11633","quizId":379,"title":"Knowledge Check #1\r","text":"What are the CIS 20 best practices?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["3"]}}},{"id":"Click_Box_20","class":"TODO::Senthil","instance":"Click_Box_20","roles":{"click":{"subtype":"button"}}},{"id":"Slide6140","class":"PPTX Slide","instance":"How do we Go about putting the CIS 20 Best Practices into action? ","thumbnail":"","children":["Click_Box_20"],"roles":{"slide":{"durationInFrames":300},"navigation":{"navid":"Slide6140"}}},{"id":"Click_Box_21","class":"TODO::Senthil","instance":"Click_Box_21","roles":{"click":{"subtype":"button"}}},{"id":"Slide6156","class":"PPTX Slide","instance":"Risk Assessment ","thumbnail":"","children":["Click_Box_21"],"roles":{"slide":{"durationInFrames":495},"navigation":{"navid":"Slide6156"}}},{"id":"Click_Box_23","class":"TODO::Senthil","instance":"Click_Box_23","roles":{"click":{"subtype":"button"}}},{"id":"Slide6188","class":"PPTX Slide","instance":"What is involved with a risk assessment? ","thumbnail":"","children":["Click_Box_23"],"roles":{"slide":{"durationInFrames":390},"navigation":{"navid":"Slide6188"}}},{"id":"Image_37","class":"TODO::Senthil","instance":"Image_37","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Title_AutoShape_1","class":"TODO::Senthil","instance":"Title_AutoShape_1","title":"Risk Assessment ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SubTitle_AutoShape_1","class":"TODO::Senthil","instance":"SubTitle_AutoShape_1","title":"Click on the term to see how each step fits into the Risk Assessment Process ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN01_1","class":"TODO::Senthil","instance":"s35_BTN01_1","title":"Inventory Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15032","class":"TODO::Senthil","title":"Inventory Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15045","class":"TODO::Senthil","title":"Inventory Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN02_2","class":"TODO::Senthil","instance":"s35_BTN02_2","title":"Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15081","class":"TODO::Senthil","title":"Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15094","class":"TODO::Senthil","title":"Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN03_3","class":"TODO::Senthil","instance":"s35_BTN03_3","title":"Protect Against Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15131","class":"TODO::Senthil","title":"Protect Against Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15144","class":"TODO::Senthil","title":"Protect Against Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN04_4","class":"TODO::Senthil","instance":"s35_BTN04_4","title":"Detect Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15180","class":"TODO::Senthil","title":"Detect Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15193","class":"TODO::Senthil","title":"Detect Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"S35_content01_5","class":"TODO::Senthil","instance":"S35_content01_5","title":"We inventory all of our hardware and software systems and network assessments to assess our potential for risk. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"S35_content02_6","class":"TODO::Senthil","instance":"S35_content02_6","title":"We understand the array of cyber threats that can be used to attach our networks and to gain access to nonpublic information. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Button_15","class":"TODO::Senthil","instance":"Button_15","roles":{"click":{"subtype":"button"}}},{"id":"si32715","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"si32729","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"S35_content03_7","class":"TODO::Senthil","instance":"S35_content03_7","title":"We provide constant vigilance and management of our networks and assets, and we limit administrative privileges to protect against threats. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"S35_content04_8","class":"TODO::Senthil","instance":"S35_content04_8","title":"We monitor our systems and network constantly through the use of logs, event notifications, and other methods to detect threats and vulnerabilities. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide15293","class":"Normal Slide","instance":"Risk Assessment Steps 1","thumbnail":"","children":["Image_37","s35_BTN01_1","si15032","si15045","s35_BTN02_2","si15081","si15094","s35_BTN03_3","si15131","si15144","s35_BTN04_4","si15180","si15193","S35_content01_5","S35_content02_6","Button_15","si32715","si32729","S35_content03_7","S35_content04_8"],"roles":{"slide":{"durationInFrames":18000},"navigation":{"navid":"Slide15293"}}},{"id":"Image_38","class":"TODO::Senthil","instance":"Image_38","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Title_AutoShape_2","class":"TODO::Senthil","instance":"Title_AutoShape_2","title":"Risk Assessment ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SubTitle_AutoShape_2","class":"TODO::Senthil","instance":"SubTitle_AutoShape_2","title":"Click on the term to see how each step fits into the Risk Assessment Process ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN01_9","class":"TODO::Senthil","instance":"s35_BTN01_9","title":"Respond to Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15430","class":"TODO::Senthil","title":"Respond to Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15443","class":"TODO::Senthil","title":"Respond to Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN02_10","class":"TODO::Senthil","instance":"s35_BTN02_10","title":"Recover from Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15479","class":"TODO::Senthil","title":"Recover from Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15492","class":"TODO::Senthil","title":"Recover from Threats ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"s35_BTN03_11","class":"TODO::Senthil","instance":"s35_BTN03_11","title":"Reporting ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15528","class":"TODO::Senthil","title":"Reporting ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si15541","class":"TODO::Senthil","title":"Reporting ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"S35_content01_12","class":"TODO::Senthil","instance":"S35_content01_12","title":"We analyze the event, assess its impact, and then, mitigate any damage. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Button_16","class":"TODO::Senthil","instance":"Button_16","roles":{"click":{"subtype":"button"}}},{"id":"si32760","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"si32774","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"S35_content02_13","class":"TODO::Senthil","instance":"S35_content02_13","title":"We restore networks and systems to normal operation, verify that the networks and systems are functioning normally, and then, remediate vulnerabilities in order to prevent similar events. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"S35_content03_14","class":"TODO::Senthil","instance":"S35_content03_14","title":"Our reporting obligations can vary depending upon the nature of the cybersecurity events. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide15626","class":"Normal Slide","instance":"Risk Assessment Steps 2","thumbnail":"","children":["Image_38","s35_BTN01_9","si15430","si15443","s35_BTN02_10","si15479","si15492","s35_BTN03_11","si15528","si15541","S35_content01_12","Button_16","si32760","si32774","S35_content02_13","S35_content03_14"],"roles":{"slide":{"durationInFrames":18000},"navigation":{"navid":"Slide15626"}}},{"id":"Click_Box_26","class":"TODO::Senthil","instance":"Click_Box_26","roles":{"click":{"subtype":"button"}}},{"id":"Slide6236","class":"PPTX Slide","instance":"Self-Check ","thumbnail":"","children":["Click_Box_26"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6236"}}},{"id":"Image_24","class":"TODO::Senthil","instance":"Image_24","roles":{"click":{"subtype":"button","question":"Slide18904q4"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si18710","class":"TODO::Senthil","instance":"Text_Caption_53","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si18722","class":"TODO::Senthil","instance":"Text_Caption_54","title":"When a cybersecurity events occurs, we have to respond quickly. Can you sequence our actions into their correct order? Drag and drop the actions into the correct order. ","roles":{"textData":{}}},{"id":"si18733","class":"TODO::Senthil","instance":"Text_Caption_55","title":"a. ","roles":{"textData":{}}},{"id":"si18737","class":"TODO::Senthil","instance":"Text_Caption_56","roles":{}},{"id":"si18737c","class":"TODO::Senthil","roles":{"answer":{"title":"Analyze the event in order to determine which information systems are affected, who originated the event, and how the event is occurring.","index":"Not implemented"}}},{"id":"si18743","class":"TODO::Senthil","instance":"Text_Caption_57","title":"b. ","roles":{"textData":{}}},{"id":"si18747","class":"TODO::Senthil","instance":"Text_Caption_58","roles":{}},{"id":"si18747c","class":"TODO::Senthil","roles":{"answer":{"title":"Mitigate the event by containing the damage and then eliminating the components of the events.","index":"Not implemented"}}},{"id":"si18753","class":"TODO::Senthil","instance":"Text_Caption_59","title":"c. ","roles":{"textData":{}}},{"id":"si18757","class":"TODO::Senthil","instance":"Text_Caption_60","roles":{}},{"id":"si18757c","class":"TODO::Senthil","roles":{"answer":{"title":"Restore information systems to normal operation, verify that they are functioning normally, and then, remediate vulnerabilities.","index":"Not implemented"}}},{"id":"si18763","class":"TODO::Senthil","instance":"Text_Caption_61","title":"d. ","roles":{"textData":{}}},{"id":"si18767","class":"TODO::Senthil","instance":"Text_Caption_62","roles":{}},{"id":"si18767c","class":"TODO::Senthil","roles":{"answer":{"title":"Assess the impact of the event on our business reputation, business functionality, information, and ability to recover.","index":"Not implemented"}}},{"id":"si18773","class":"TODO::Senthil","instance":"Text_Caption_63","title":"e. ","roles":{"textData":{}}},{"id":"si18777","class":"TODO::Senthil","instance":"Text_Caption_64","roles":{}},{"id":"si18777c","class":"TODO::Senthil","roles":{"answer":{"title":"Report the event to the appropriate authorities, if necessary.","index":"Not implemented"}}},{"id":"si18816","class":"TODO::Senthil","instance":"Button_5","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide18904q4","for":"Slide18904q4"},"textData":{}}},{"id":"si18828","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide18904q4","for":"Slide18904q4"},"textData":{}}},{"id":"si18840","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide18904q4","for":"Slide18904q4"},"textData":{}}},{"id":"si18890","class":"TODO::Senthil","instance":"SmartShape_14","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide18904q4"},"textData":{}}},{"id":"si32627","class":"TODO::Senthil","title":"Correct Answer: Analyze the event in order to determine which information systems are affected, who originated the event, and how the event is occurring. Mitigate the event by containing the damage and then eliminating the components of the event. Restore information systems to normal operation, verify that they are functioning normally, and then remediate vulnerabilities. Assess the impact of the event on our business reputation, business functionality, information, and ability to recover. Report the event to the appropriate authorities, if necessary. Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide18904q4"},"textData":{}}},{"id":"Slide18904","class":"Question Slide","instance":"","thumbnail":"","children":["Image_24","si18710","si18722","si18737","si18747","si18757","si18767","si18777","si18816","si18828","si18840"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide18904"},"question":{"interactionId":"18683","quizId":379,"title":"Knowledge Check #2\r","text":"When a cybersecurity events occurs, we have to respond quickly. Can you sequence our actions into their correct order? \r\rDrag and drop the actions into the correct order.\r","type":"knowledgeCheck","ikc":true,"interactionType":"sequencing","ramdomized":false,"correctAnswers":["si18737c","si18747c","si18757c","si18767c","si18777c"]}}},{"id":"Image_25","class":"TODO::Senthil","instance":"Image_25","roles":{"click":{"subtype":"button","question":"Slide19260q5"},"question":{"interactionId":"31487","quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si18979","class":"TODO::Senthil","instance":"Text_Caption_65","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si18991","class":"TODO::Senthil","instance":"Text_Caption_66","title":"The following terms are fundamental to any Risk Assessment. Can you match them to their corresponding definitions? ","roles":{"textData":{}}},{"id":"Text_Caption_68","class":"TODO::Senthil","instance":"Text_Caption_68","title":"b ","roles":{"textData":{}}},{"id":"Text_Caption_69","class":"TODO::Senthil","instance":"Text_Caption_69","title":"Recover from threats ","roles":{"textData":{}}},{"id":"Text_Caption_70","class":"TODO::Senthil","instance":"Text_Caption_70","title":"c ","roles":{"textData":{}}},{"id":"Text_Caption_71","class":"TODO::Senthil","instance":"Text_Caption_71","title":"Protecting against threats ","roles":{"textData":{}}},{"id":"Text_Caption_72","class":"TODO::Senthil","instance":"Text_Caption_72","title":"e ","roles":{"textData":{}}},{"id":"Text_Caption_73","class":"TODO::Senthil","instance":"Text_Caption_73","title":"Threats ","roles":{"textData":{}}},{"id":"Text_Caption_74","class":"TODO::Senthil","instance":"Text_Caption_74","title":"d ","roles":{"textData":{}}},{"id":"Text_Caption_75","class":"TODO::Senthil","instance":"Text_Caption_75","title":"Respond to threats ","roles":{"textData":{}}},{"id":"Text_Caption_76","class":"TODO::Senthil","instance":"Text_Caption_76","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_77","class":"TODO::Senthil","instance":"Text_Caption_77","title":"Inventory ","roles":{"textData":{}}},{"id":"si19069","class":"TODO::Senthil","instance":"Text_Caption_79","title":"a. ","roles":{"textData":{}}},{"id":"si19073","class":"TODO::Senthil","instance":"Text_Caption_80","title":"We inventory all of our hardware and software systems and network assessment to assess our potential risk. ","roles":{"textData":{}}},{"id":"si19073ans","class":"TODO::Senthil","roles":{"answer":{"title":"We inventory all of our hardware and software systems and network assessment to assess our potential risk.","index":"Not implemented"}}},{"id":"si19079","class":"TODO::Senthil","instance":"Text_Caption_81","title":"b. ","roles":{"textData":{}}},{"id":"si19083","class":"TODO::Senthil","instance":"Text_Caption_82","title":"We restore networks and systems to normal operation, verify that the networks and systems are functioning normally, and then, remediate vulnerabilities in orders to prevent similar events. ","roles":{"textData":{}}},{"id":"si19083ans","class":"TODO::Senthil","roles":{"answer":{"title":"We restore networks and systems to normal operation, verify that the networks and systems are functioning normally, and then, remediate vulnerabilities in orders to prevent similar events.","index":"Not implemented"}}},{"id":"si19089","class":"TODO::Senthil","instance":"Text_Caption_83","title":"c. ","roles":{"textData":{}}},{"id":"si19093","class":"TODO::Senthil","instance":"Text_Caption_84","title":"We provide constant vigilance and management of our networks and assets and limit administrative privileges to protect against threats. ","roles":{"textData":{}}},{"id":"si19093ans","class":"TODO::Senthil","roles":{"answer":{"title":"We provide constant vigilance and management of our networks and assets and limit administrative privileges to protect against threats.","index":"Not implemented"}}},{"id":"si19099","class":"TODO::Senthil","instance":"Text_Caption_85","title":"d. ","roles":{"textData":{}}},{"id":"si19103","class":"TODO::Senthil","instance":"Text_Caption_86","title":"We analyze the event, assess its impact, and then, mitigate any damage. ","roles":{"textData":{}}},{"id":"si19103ans","class":"TODO::Senthil","roles":{"answer":{"title":"We analyze the event, assess its impact, and then, mitigate any damage.","index":"Not implemented"}}},{"id":"si19109","class":"TODO::Senthil","instance":"Text_Caption_87","title":"e. ","roles":{"textData":{}}},{"id":"si19113","class":"TODO::Senthil","instance":"Text_Caption_88","title":"An attempt to disrupt, misuse, or gain unauthorized access to an information system. ","roles":{"textData":{}}},{"id":"si19113ans","class":"TODO::Senthil","roles":{"answer":{"title":"An attempt to disrupt, misuse, or gain unauthorized access to an information system.","index":"Not implemented"}}},{"id":"si19186","class":"TODO::Senthil","instance":"Button_6","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide19260q5","for":"Slide19260q5"},"textData":{}}},{"id":"si19198","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide19260q5","for":"Slide19260q5"},"textData":{}}},{"id":"si19210","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide19260q5","for":"Slide19260q5"},"textData":{}}},{"id":"si19156","class":"TODO::Senthil","instance":"SmartShape_15","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide19260q5"},"textData":{}}},{"id":"si19246","class":"TODO::Senthil","instance":"SmartShape_17","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide19260q5"},"textData":{}}},{"id":"si32671","class":"TODO::Senthil","title":"Correct Answer: Recover from threats - We restore networks and systems to normal operation, verify that the networks and systems are functioning normally, and then remediate vulnerabilities in order to prevent similar events. Protecting against threats - We provide constant vigilance and management of our networks and assets and limit administrative privileges to protect against threats. Threats - An attempt to disrupt, misuse, or gain unauthorized access to an information system. Respond to threats - We analyze the event, assess its impact, and then mitigate any damage. Inventory - We inventory all of our hardware and software systems and network assets to assess our potential for risk. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide19260q5"},"textData":{}}},{"id":"Slide19260","class":"Question Slide","instance":"","thumbnail":"","children":["Image_25","si18979","si18991","si19073","si19083","si19093","si19103","si19113","si19186","si19198","si19210","si19156"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide19260"},"question":{"interactionId":"18916","quizId":379,"title":"Knowledge Check #2\r","text":"The following terms are fundamental to any Risk Assessment. Can you match them to their corresponding definitions?\r","type":"knowledgeCheck","ikc":true,"interactionType":"matching","ramdomized":true,"correctAnswers":[]}}},{"id":"Image_26","class":"TODO::Senthil","instance":"Image_26","roles":{"click":{"subtype":"button","question":"Slide19509q6"},"question":{"interactionId":"31499","quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si19310","class":"TODO::Senthil","instance":"Text_Caption_89","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si19322","class":"TODO::Senthil","instance":"Text_Caption_90","title":"Which of these groups exploits cyber vulnerabilities? ","roles":{"textData":{}}},{"id":"si19378","class":"TODO::Senthil","instance":"1_36","roles":{}},{"id":"si19334","class":"TODO::Senthil","instance":"Text_Caption_91","title":" ","roles":{"textData":{}}},{"id":"si19338","class":"TODO::Senthil","instance":"Text_Caption_92","title":"Criminals ","roles":{"textData":{}}},{"id":"si19334_a","class":"TODO::Senthil","instance":"2_16","roles":{"answer":{"title":"Criminals\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si19345","class":"TODO::Senthil","instance":"Text_Caption_93","title":" ","roles":{"textData":{}}},{"id":"si19349","class":"TODO::Senthil","instance":"Text_Caption_94","title":"Hackers ","roles":{"textData":{}}},{"id":"si19345_a","class":"TODO::Senthil","instance":"4_17","roles":{"answer":{"title":"Hackers\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si19367","class":"TODO::Senthil","instance":"Text_Caption_97","title":" ","roles":{"textData":{}}},{"id":"si19371","class":"TODO::Senthil","instance":"Text_Caption_98","title":"All of the above ","roles":{"textData":{}}},{"id":"si19367_a","class":"TODO::Senthil","instance":"37","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si19356","class":"TODO::Senthil","instance":"Text_Caption_95","title":" ","roles":{"textData":{}}},{"id":"si19360","class":"TODO::Senthil","instance":"Text_Caption_96","title":"Foreign governments ","roles":{"textData":{}}},{"id":"si19356_a","class":"TODO::Senthil","instance":"6_18","roles":{"answer":{"title":"Foreign governments\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si19439","class":"TODO::Senthil","instance":"Button_7","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide19509q6","for":"Slide19509q6"},"textData":{}}},{"id":"si19451","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide19509q6","for":"Slide19509q6"},"textData":{}}},{"id":"si19463","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide19509q6","for":"Slide19509q6"},"textData":{}}},{"id":"si19409","class":"TODO::Senthil","instance":"SmartShape_18","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide19509q6"},"textData":{}}},{"id":"si19495","class":"TODO::Senthil","instance":"SmartShape_20","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide19509q6"},"textData":{}}},{"id":"si32684","class":"TODO::Senthil","title":"Correct Answer: All of the above. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide19509q6"},"textData":{}}},{"id":"Slide19509","class":"Question Slide","instance":"","thumbnail":"","children":["Image_26","si19310","si19322","si19338","si19349","si19371","si19360","si19439","si19451","si19463","si19409"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide19509"},"question":{"interactionId":"19283","quizId":379,"title":"Knowledge Check #2\r","text":"Which of these groups exploits cyber vulnerabilities?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["4"]}}},{"id":"Click_Box_31","class":"TODO::Senthil","instance":"Click_Box_31","roles":{"click":{"subtype":"button"}}},{"id":"Slide6316","class":"PPTX Slide","instance":"Inventory Assets ","thumbnail":"","children":["Click_Box_31"],"roles":{"slide":{"durationInFrames":1113},"navigation":{"navid":"Slide6316"}}},{"id":"Click_Box_82","class":"TODO::Senthil","instance":"Click_Box_82","roles":{"click":{"subtype":"button"}}},{"id":"Slide34030","class":"PPTX Slide","instance":"Threats ","thumbnail":"","children":["Click_Box_82"],"roles":{"slide":{"durationInFrames":855},"navigation":{"navid":"Slide34030"}}},{"id":"Text_Caption_99","class":"TODO::Senthil","instance":"Text_Caption_99","title":"Types of Threats ","roles":{"textData":{}}},{"id":"Image_10","class":"TODO::Senthil","instance":"Image_10","roles":{"click":{"subtype":"button"},"question":{"interactionId":"22578","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"AcctTak1_15","class":"TODO::Senthil","instance":"AcctTak1_15","title":"Account Takeover ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22640","class":"TODO::Senthil","title":"Account Takeover ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22653","class":"TODO::Senthil","title":"Account Takeover ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Bckdr_16","class":"TODO::Senthil","instance":"Bckdr_16","title":"Back door ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22689","class":"TODO::Senthil","title":"Back door ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22702","class":"TODO::Senthil","title":"Back door ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DtaExfl_17","class":"TODO::Senthil","instance":"DtaExfl_17","title":"Data Ex-filtration ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22738","class":"TODO::Senthil","title":"Data Ex-filtration ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22751","class":"TODO::Senthil","title":"Data Ex-filtration ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DoS_18","class":"TODO::Senthil","instance":"DoS_18","title":"Denial of Service (DoS) Attack ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22787","class":"TODO::Senthil","title":"Denial of Service (DoS) Attack ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22800","class":"TODO::Senthil","title":"Denial of Service (DoS) Attack ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Eaves_19","class":"TODO::Senthil","instance":"Eaves_19","title":"Eavesdropping ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22836","class":"TODO::Senthil","title":"Eavesdropping ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22849","class":"TODO::Senthil","title":"Eavesdropping ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"InsdrThrt_20","class":"TODO::Senthil","instance":"InsdrThrt_20","title":"Insider Threat ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22885","class":"TODO::Senthil","title":"Insider Threat ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si22898","class":"TODO::Senthil","title":"Insider Threat ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Eaves_21","class":"TODO::Senthil","instance":"Eaves_21","title":"The act of secretly listening to a private conversation between systems on a network. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DoS_22","class":"TODO::Senthil","instance":"DoS_22","title":"An attack that seeks to make a network or system unavailable to its intended users by disrupting its services. Example: flooding the targeted system with excessive illegitimate requests that overloads the system, preventing legitimate requests from being fulfilled. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"InsdrThrt_23","class":"TODO::Senthil","instance":"InsdrThrt_23","title":"A malicious threat to an organization that comes from people within the organization with inside information about the organization's security practices, computer systems, or information; for example, the theft of confidential or commercially valuable information. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DtaExfl_24","class":"TODO::Senthil","instance":"DtaExfl_24","title":"The unauthorized transfer of data from a computer. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Bckdr2_25","class":"TODO::Senthil","instance":"Bckdr2_25","title":"A secret method of bypassing the normal authentication or security controls; for example, use of a default password that has not been changed. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"AcctTak2_26","class":"TODO::Senthil","instance":"AcctTak2_26","title":"A form of identity theft in which the attacker obtains access to a user's account, typically via a back door, malware, or phishing, and then makes unauthorized transactions. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Button_17","class":"TODO::Senthil","instance":"Button_17","roles":{"click":{"subtype":"button"}}},{"id":"si33614","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"si33628","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"Slide23014","class":"Normal Slide","instance":"Types of Threats 1","thumbnail":"","children":["Text_Caption_99","Image_10","AcctTak1_15","si22640","si22653","Bckdr_16","si22689","si22702","DtaExfl_17","si22738","si22751","DoS_18","si22787","si22800","Eaves_19","si22836","si22849","InsdrThrt_20","si22885","si22898","Eaves_21","DoS_22","InsdrThrt_23","DtaExfl_24","Bckdr2_25","AcctTak2_26","Button_17","si33614","si33628"],"roles":{"slide":{"durationInFrames":18000},"navigation":{"navid":"Slide23014"}}},{"id":"Text_Caption_100","class":"TODO::Senthil","instance":"Text_Caption_100","title":"Types of Threats ","roles":{"textData":{}}},{"id":"Image_11","class":"TODO::Senthil","instance":"Image_11","roles":{"click":{"subtype":"button"},"question":{"interactionId":"23035","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"Phsh_27","class":"TODO::Senthil","instance":"Phsh_27","title":"Phishing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23097","class":"TODO::Senthil","title":"Phishing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23110","class":"TODO::Senthil","title":"Phishing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Priv_28","class":"TODO::Senthil","instance":"Priv_28","title":"Privilege Escalation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23146","class":"TODO::Senthil","title":"Privilege Escalation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23159","class":"TODO::Senthil","title":"Privilege Escalation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Ransm_29","class":"TODO::Senthil","instance":"Ransm_29","title":"Ransomware ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23195","class":"TODO::Senthil","title":"Ransomware ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23208","class":"TODO::Senthil","title":"Ransomware ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"ScEng_30","class":"TODO::Senthil","instance":"ScEng_30","title":"Social Engineering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23244","class":"TODO::Senthil","title":"Social Engineering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23257","class":"TODO::Senthil","title":"Social Engineering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Spf_31","class":"TODO::Senthil","instance":"Spf_31","title":"Spoofing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23293","class":"TODO::Senthil","title":"Spoofing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23306","class":"TODO::Senthil","title":"Spoofing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"InsdrThrt_32","class":"TODO::Senthil","instance":"InsdrThrt_32","title":"Tampering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23342","class":"TODO::Senthil","title":"Tampering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si23355","class":"TODO::Senthil","title":"Tampering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Spf_33","class":"TODO::Senthil","instance":"Spf_33","title":"A situation in which a person or program successfully masquerades as another by falsifying data; for example, the creation of an email message with a forged sender address. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"ScEng_34","class":"TODO::Senthil","instance":"ScEng_34","title":"The psychological manipulation of people into performing actions or divulging sensitive information; for example, the impersonation of a trusted contractor or customer. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Tmpg_35","class":"TODO::Senthil","instance":"Tmpg_35","title":"A malicious modification of software or information. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Ransm_36","class":"TODO::Senthil","instance":"Ransm_36","title":"A type of malicious software that blocks access to the victim's data or threatens to publish or delete it until a ransom is paid. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Priv_37","class":"TODO::Senthil","instance":"Priv_37","title":"A situation where a user with a level of privilege or access is able to increase his or her level of privilege or access; for example, a user fools the system into giving him or her access to restricted data. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Phsh_38","class":"TODO::Senthil","instance":"Phsh_38","title":"An attempt to obtain sensitive information by disguising as a trustworthy source in an electronic communication; for example, an email directing a user to enter details at an illegitimate website that looks and functions in an identical manner to the legitimate site. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Button_18","class":"TODO::Senthil","instance":"Button_18","roles":{"click":{"subtype":"button"}}},{"id":"si33659","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"si33673","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"Slide23471","class":"Normal Slide","instance":"Types of Threats 2","thumbnail":"","children":["Text_Caption_100","Image_11","Phsh_27","si23097","si23110","Priv_28","si23146","si23159","Ransm_29","si23195","si23208","ScEng_30","si23244","si23257","Spf_31","si23293","si23306","InsdrThrt_32","si23342","si23355","Spf_33","ScEng_34","Tmpg_35","Ransm_36","Priv_37","Phsh_38","Button_18","si33659","si33673"],"roles":{"slide":{"durationInFrames":18000},"navigation":{"navid":"Slide23471"}}},{"id":"Click_Box_34","class":"TODO::Senthil","instance":"Click_Box_34","roles":{"click":{"subtype":"button"}}},{"id":"Image_39","class":"TODO::Senthil","instance":"Image_39","roles":{"click":{"subtype":"button"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"Slide6364","class":"PPTX Slide","instance":"Slide 34","thumbnail":"","children":["Click_Box_34","Image_39"],"roles":{"slide":{"durationInFrames":864},"navigation":{"navid":"Slide6364"}}},{"id":"Click_Box_35","class":"TODO::Senthil","instance":"Click_Box_35","roles":{"click":{"subtype":"button"}}},{"id":"Image_40","class":"TODO::Senthil","instance":"Image_40","roles":{"click":{"subtype":"button"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"Slide6380","class":"PPTX Slide","instance":"Slide 35","thumbnail":"","children":["Click_Box_35","Image_40"],"roles":{"slide":{"durationInFrames":975},"navigation":{"navid":"Slide6380"}}},{"id":"Click_Box_37","class":"TODO::Senthil","instance":"Click_Box_37","roles":{"click":{"subtype":"button"}}},{"id":"Slide6412","class":"PPTX Slide","instance":"Self-Check ","thumbnail":"","children":["Click_Box_37"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6412"}}},{"id":"Image_29","class":"TODO::Senthil","instance":"Image_29","roles":{"click":{"subtype":"button","question":"Slide26734q7"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si26558","class":"TODO::Senthil","instance":"Text_Caption_101","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si26570","class":"TODO::Senthil","instance":"Text_Caption_102","title":"True or False: Eavesdropping is the act of secretly listening to a private conversation between systems on a network. ","roles":{"textData":{}}},{"id":"si26581","class":"TODO::Senthil","instance":"Text_Caption_103","title":" ","roles":{"textData":{}}},{"id":"si26585","class":"TODO::Senthil","instance":"Text_Caption_104","title":"True ","roles":{"textData":{}}},{"id":"si26581_a","class":"TODO::Senthil","instance":"39","roles":{"answer":{"title":"True\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si26592","class":"TODO::Senthil","instance":"Text_Caption_105","title":" ","roles":{"textData":{}}},{"id":"si26596","class":"TODO::Senthil","instance":"Text_Caption_106","title":"False ","roles":{"textData":{}}},{"id":"si26592_a","class":"TODO::Senthil","instance":"41","roles":{"answer":{"title":"False\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si26664","class":"TODO::Senthil","instance":"Button_8","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide26734q7","for":"Slide26734q7"},"textData":{}}},{"id":"si26676","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide26734q7","for":"Slide26734q7"},"textData":{}}},{"id":"si26688","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide26734q7","for":"Slide26734q7"},"textData":{}}},{"id":"si26634","class":"TODO::Senthil","instance":"SmartShape_21","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide26734q7"},"textData":{}}},{"id":"si26720","class":"TODO::Senthil","instance":"SmartShape_23","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide26734q7"},"textData":{}}},{"id":"si32787","class":"TODO::Senthil","title":"Correct Answer: True, eavesdropping is secretly listening to a private conversation between systems on a network. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide26734q7"},"textData":{}}},{"id":"Slide26734","class":"Question Slide","instance":"","thumbnail":"","children":["Image_29","si26558","si26570","si26585","si26596","si26664","si26676","si26688","si26634"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide26734"},"question":{"interactionId":"26531","quizId":379,"title":"Knowledge Check #3\r","text":"True or False: Eavesdropping is the act of secretly listening to a private conversation between systems on a network.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_30","class":"TODO::Senthil","instance":"Image_30","roles":{"click":{"subtype":"button","question":"Slide26952q8"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si26776","class":"TODO::Senthil","instance":"Text_Caption_107","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si26788","class":"TODO::Senthil","instance":"Text_Caption_108","title":"True/False: Back door is a term that refers to a secret meeting of thieves behind the building. ","roles":{"textData":{}}},{"id":"si26799","class":"TODO::Senthil","instance":"Text_Caption_109","title":" ","roles":{"textData":{}}},{"id":"si26803","class":"TODO::Senthil","instance":"Text_Caption_110","title":"True ","roles":{"textData":{}}},{"id":"si26799_a","class":"TODO::Senthil","instance":"44","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si26810","class":"TODO::Senthil","instance":"Text_Caption_111","title":" ","roles":{"textData":{}}},{"id":"si26814","class":"TODO::Senthil","instance":"Text_Caption_112","title":"False ","roles":{"textData":{}}},{"id":"si26810_a","class":"TODO::Senthil","instance":"46","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si26882","class":"TODO::Senthil","instance":"Button_9","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide26952q8","for":"Slide26952q8"},"textData":{}}},{"id":"si26894","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide26952q8","for":"Slide26952q8"},"textData":{}}},{"id":"si26906","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide26952q8","for":"Slide26952q8"},"textData":{}}},{"id":"si26852","class":"TODO::Senthil","instance":"SmartShape_24","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide26952q8"},"textData":{}}},{"id":"si26938","class":"TODO::Senthil","instance":"SmartShape_26","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide26952q8"},"textData":{}}},{"id":"si32800","class":"TODO::Senthil","title":"Correct Answer: False, A back door is a A secret method of bypassing the normal authentication or security controls; for example, use of a default password that has not been changed. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide26952q8"},"textData":{}}},{"id":"Slide26952","class":"Question Slide","instance":"","thumbnail":"","children":["Image_30","si26776","si26788","si26803","si26814","si26882","si26894","si26906","si26852"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide26952"},"question":{"interactionId":"26749","quizId":379,"title":"Knowledge Check #3\r","text":"True/False: Backdoor is a term that refers to a secret meeting of thieves behind the building.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["2"]}}},{"id":"Image_31","class":"TODO::Senthil","instance":"Image_31","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si27018","class":"TODO::Senthil","instance":"Text_Caption_113","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si27030","class":"TODO::Senthil","instance":"Text_Caption_114","title":"Select four (4) types of cybersecurity threats to our information systems. ","roles":{"textData":{}}},{"id":"si27041","class":"TODO::Senthil","instance":"Text_Caption_115","title":" ","roles":{"textData":{}}},{"id":"si27045","class":"TODO::Senthil","instance":"Text_Caption_116","title":"Tampering ","roles":{"textData":{}}},{"id":"si27045","class":"TODO::Senthil","instance":"48","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27041_a","class":"TODO::Senthil","instance":"49","roles":{"answer":{"title":"Tampering\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27052","class":"TODO::Senthil","instance":"Text_Caption_117","title":" ","roles":{"textData":{}}},{"id":"si27056","class":"TODO::Senthil","instance":"Text_Caption_118","title":"Electricity failure ","roles":{"textData":{}}},{"id":"si27056","class":"TODO::Senthil","instance":"50","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27052_a","class":"TODO::Senthil","instance":"51","roles":{"answer":{"title":"Electricity failure\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27063","class":"TODO::Senthil","instance":"Text_Caption_119","title":" ","roles":{"textData":{}}},{"id":"si27067","class":"TODO::Senthil","instance":"Text_Caption_120","title":"Spoofing ","roles":{"textData":{}}},{"id":"si27067","class":"TODO::Senthil","instance":"52","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27063_a","class":"TODO::Senthil","instance":"53","roles":{"answer":{"title":"Spoofing\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27074","class":"TODO::Senthil","instance":"Text_Caption_121","title":" ","roles":{"textData":{}}},{"id":"si27078","class":"TODO::Senthil","instance":"Text_Caption_122","title":"VPN ware ","roles":{"textData":{}}},{"id":"si27078","class":"TODO::Senthil","instance":"54","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27074_a","class":"TODO::Senthil","instance":"55","roles":{"answer":{"title":"VPN ware\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27085","class":"TODO::Senthil","instance":"Text_Caption_123","title":" ","roles":{"textData":{}}},{"id":"si27089","class":"TODO::Senthil","instance":"Text_Caption_124","title":"Ransomware ","roles":{"textData":{}}},{"id":"si27089","class":"TODO::Senthil","instance":"56","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27085_a","class":"TODO::Senthil","instance":"57","roles":{"answer":{"title":"Ransomware\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27096","class":"TODO::Senthil","instance":"Text_Caption_125","title":" ","roles":{"textData":{}}},{"id":"si27100","class":"TODO::Senthil","instance":"Text_Caption_126","title":"Malfunction of a server with data ","roles":{"textData":{}}},{"id":"si27100","class":"TODO::Senthil","instance":"58","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27096_a","class":"TODO::Senthil","instance":"59","roles":{"answer":{"title":"Malfunction of a server with data\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27107","class":"TODO::Senthil","instance":"Text_Caption_127","title":" ","roles":{"textData":{}}},{"id":"si27111","class":"TODO::Senthil","instance":"Text_Caption_128","title":"DoS attack ","roles":{"textData":{}}},{"id":"si27111","class":"TODO::Senthil","instance":"60","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27107_a","class":"TODO::Senthil","instance":"61","roles":{"answer":{"title":"DoS attack\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27118","class":"TODO::Senthil","instance":"Text_Caption_129","title":" ","roles":{"textData":{}}},{"id":"si27122","class":"TODO::Senthil","instance":"Text_Caption_130","title":"All of the above ","roles":{"textData":{}}},{"id":"si27122","class":"TODO::Senthil","instance":"62","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si27118_a","class":"TODO::Senthil","instance":"63","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si27190","class":"TODO::Senthil","instance":"Button_10","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide27260q9","for":"Slide27260q9"},"textData":{}}},{"id":"si27202","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide27260q9","for":"Slide27260q9"},"textData":{}}},{"id":"si27214","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide27260q9","for":"Slide27260q9"},"textData":{}}},{"id":"si27160","class":"TODO::Senthil","instance":"SmartShape_27","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"textData":{}}},{"id":"si27246","class":"TODO::Senthil","instance":"SmartShape_29","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"textData":{}}},{"id":"si32813","class":"TODO::Senthil","title":"Correct Answer: Tampering, Spoofing, Ransomware, and DoS Attacks are all types of cybersecurity threats. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide27260q9"},"textData":{}}},{"id":"Slide27260","class":"Question Slide","instance":"","thumbnail":"","children":["Image_31","si27018","si27030","si27045","si27056","si27067","si27078","si27089","si27100","si27111","si27122","si27190","si27202","si27214","si27160"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide27260"},"question":{"interactionId":"26991","quizId":379,"title":"Knowledge Check #3\r","text":"Select four (4) types of cybersecurity threats to our information systems.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["1","3","5","7"]}}},{"id":"Click_Box_42","class":"TODO::Senthil","instance":"Click_Box_42","roles":{"click":{"subtype":"button"}}},{"id":"Slide6492","class":"PPTX Slide","instance":"What measures have we put into place to protect us from these threats? ","thumbnail":"","children":["Click_Box_42"],"roles":{"slide":{"durationInFrames":240},"navigation":{"navid":"Slide6492"}}},{"id":"Click_Box_43","class":"TODO::Senthil","instance":"Click_Box_43","roles":{"click":{"subtype":"button"}}},{"id":"Slide6508","class":"PPTX Slide","instance":"Preparation is Essential ","thumbnail":"","children":["Click_Box_43"],"roles":{"slide":{"durationInFrames":765},"navigation":{"navid":"Slide6508"}}},{"id":"Click_Box_44","class":"TODO::Senthil","instance":"Click_Box_44","roles":{"click":{"subtype":"button"}}},{"id":"Slide6524","class":"PPTX Slide","instance":"Prevention is Critical ","thumbnail":"","children":["Click_Box_44"],"roles":{"slide":{"durationInFrames":729},"navigation":{"navid":"Slide6524"}}},{"id":"Click_Box_45","class":"TODO::Senthil","instance":"Click_Box_45","roles":{"click":{"subtype":"button"}}},{"id":"Slide6540","class":"PPTX Slide","instance":"Prevention is Critical ","thumbnail":"","children":["Click_Box_45"],"roles":{"slide":{"durationInFrames":462},"navigation":{"navid":"Slide6540"}}},{"id":"Click_Box_47","class":"TODO::Senthil","instance":"Click_Box_47","roles":{"click":{"subtype":"button"}}},{"id":"Slide6572","class":"PPTX Slide","instance":"Access Controls ","thumbnail":"","children":["Click_Box_47"],"roles":{"slide":{"durationInFrames":915},"navigation":{"navid":"Slide6572"}}},{"id":"Click_Box_48","class":"TODO::Senthil","instance":"Click_Box_48","roles":{"click":{"subtype":"button"}}},{"id":"Slide6588","class":"PPTX Slide","instance":"Security Controls ","thumbnail":"","children":["Click_Box_48"],"roles":{"slide":{"durationInFrames":741},"navigation":{"navid":"Slide6588"}}},{"id":"Click_Box_50","class":"TODO::Senthil","instance":"Click_Box_50","roles":{"click":{"subtype":"button"}}},{"id":"Slide6620","class":"PPTX Slide","instance":"How do we respond to a cybersecurity event? ","thumbnail":"","children":["Click_Box_50"],"roles":{"slide":{"durationInFrames":882},"navigation":{"navid":"Slide6620"}}},{"id":"Click_Box_52","class":"TODO::Senthil","instance":"Click_Box_52","roles":{"click":{"subtype":"button"}}},{"id":"Slide6652","class":"PPTX Slide","instance":"How do we respond to a cybersecurity event? ","thumbnail":"","children":["Click_Box_52"],"roles":{"slide":{"durationInFrames":303},"navigation":{"navid":"Slide6652"}}},{"id":"Click_Box_53","class":"TODO::Senthil","instance":"Click_Box_53","roles":{"click":{"subtype":"button"}}},{"id":"Slide6668","class":"PPTX Slide","instance":"Analysis ","thumbnail":"","children":["Click_Box_53"],"roles":{"slide":{"durationInFrames":516},"navigation":{"navid":"Slide6668"}}},{"id":"SmartShape_62","class":"TODO::Senthil","instance":"SmartShape_62","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_63","class":"TODO::Senthil","instance":"SmartShape_63","title":"Impact Assessment ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_64","class":"TODO::Senthil","instance":"SmartShape_64","title":"Business Reputation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_65","class":"TODO::Senthil","instance":"SmartShape_65","title":"Business Functionality ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_66","class":"TODO::Senthil","instance":"SmartShape_66","title":"Business Reputation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_67","class":"TODO::Senthil","instance":"SmartShape_67","title":"Confidentiality & Integrity of Information ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide34222","class":"Normal Slide","instance":"","thumbnail":"","children":["SmartShape_62","SmartShape_63","SmartShape_64","SmartShape_65","SmartShape_66","SmartShape_67"],"roles":{"slide":{"durationInFrames":2856},"navigation":{"navid":"Slide34222"}}},{"id":"Click_Box_55","class":"TODO::Senthil","instance":"Click_Box_55","roles":{"click":{"subtype":"button"}}},{"id":"Slide6700","class":"PPTX Slide","instance":"Mitigation ","thumbnail":"","children":["Click_Box_55"],"roles":{"slide":{"durationInFrames":858},"navigation":{"navid":"Slide6700"}}},{"id":"Click_Box_57","class":"TODO::Senthil","instance":"Click_Box_57","roles":{"click":{"subtype":"button"}}},{"id":"Slide6732","class":"PPTX Slide","instance":"How do we recover from a cybersecurity event? ","thumbnail":"","children":["Click_Box_57"],"roles":{"slide":{"durationInFrames":429},"navigation":{"navid":"Slide6732"}}},{"id":"Click_Box_58","class":"TODO::Senthil","instance":"Click_Box_58","roles":{"click":{"subtype":"button"}}},{"id":"Slide6748","class":"PPTX Slide","instance":"Road to Recovery ","thumbnail":"","children":["Click_Box_58"],"roles":{"slide":{"durationInFrames":678},"navigation":{"navid":"Slide6748"}}},{"id":"Click_Box_59","class":"TODO::Senthil","instance":"Click_Box_59","roles":{"click":{"subtype":"button"}}},{"id":"Slide6764","class":"PPTX Slide","instance":"Road to Recovery ","thumbnail":"","children":["Click_Box_59"],"roles":{"slide":{"durationInFrames":573},"navigation":{"navid":"Slide6764"}}},{"id":"Click_Box_61","class":"TODO::Senthil","instance":"Click_Box_61","roles":{"click":{"subtype":"button"}}},{"id":"Slide6796","class":"PPTX Slide","instance":"What are our reporting obligations? ","thumbnail":"","children":["Click_Box_61"],"roles":{"slide":{"durationInFrames":300},"navigation":{"navid":"Slide6796"}}},{"id":"Click_Box_62","class":"TODO::Senthil","instance":"Click_Box_62","roles":{"click":{"subtype":"button"}}},{"id":"Slide6812","class":"PPTX Slide","instance":"Reporting Obligations ","thumbnail":"","children":["Click_Box_62"],"roles":{"slide":{"durationInFrames":1155},"navigation":{"navid":"Slide6812"}}},{"id":"Click_Box_64","class":"TODO::Senthil","instance":"Click_Box_64","roles":{"click":{"subtype":"button"}}},{"id":"Slide6844","class":"PPTX Slide","instance":"Self-Check ","thumbnail":"","children":["Click_Box_64"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6844"}}},{"id":"Image_32","class":"TODO::Senthil","instance":"Image_32","roles":{"click":{"subtype":"button","question":"Slide30523q10"},"textData":{}}},{"id":"si30347","class":"TODO::Senthil","instance":"Text_Caption_131","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si30359","class":"TODO::Senthil","instance":"Text_Caption_132","title":"True/False: We create and maintain regular and systematic backups of important information. ","roles":{"textData":{}}},{"id":"si30370","class":"TODO::Senthil","instance":"Text_Caption_133","title":" ","roles":{"textData":{}}},{"id":"si30374","class":"TODO::Senthil","instance":"Text_Caption_134","title":"True ","roles":{"textData":{}}},{"id":"si30370_a","class":"TODO::Senthil","instance":"66","roles":{"answer":{"title":"True\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si30381","class":"TODO::Senthil","instance":"Text_Caption_135","title":" ","roles":{"textData":{}}},{"id":"si30385","class":"TODO::Senthil","instance":"Text_Caption_136","title":"False ","roles":{"textData":{}}},{"id":"si30381_a","class":"TODO::Senthil","instance":"68","roles":{"answer":{"title":"False\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si30453","class":"TODO::Senthil","instance":"Button_11","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide30523q10","for":"Slide30523q10"},"textData":{}}},{"id":"si30465","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide30523q10","for":"Slide30523q10"},"textData":{}}},{"id":"si30477","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide30523q10","for":"Slide30523q10"},"textData":{}}},{"id":"si30423","class":"TODO::Senthil","instance":"SmartShape_30","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide30523q10"},"textData":{}}},{"id":"si30509","class":"TODO::Senthil","instance":"SmartShape_32","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide30523q10"},"textData":{}}},{"id":"si33568","class":"TODO::Senthil","title":"Correct Answer: True, we create and maintain regular backups of important information. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide30523q10"},"textData":{}}},{"id":"Slide30523","class":"Question Slide","instance":"","thumbnail":"","children":["Image_32","si30347","si30359","si30374","si30385","si30453","si30465","si30477","si30423"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide30523"},"question":{"interactionId":"30320","quizId":379,"title":"Knowledge Check #4\r","text":"True/False: We create and maintain regular and systematic backups of important information.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_33","class":"TODO::Senthil","instance":"Image_33","roles":{"click":{"subtype":"button","question":"Slide30898q11"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si30616","class":"TODO::Senthil","instance":"Text_Caption_137","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si30628","class":"TODO::Senthil","instance":"Text_Caption_138","title":"Identify which of the following are access controls and which are security controls. ","roles":{"textData":{}}},{"id":"si30635","class":"TODO::Senthil","instance":"Text_Caption_139","title":"Action ","roles":{"textData":{}}},{"id":"Text_Caption_140","class":"TODO::Senthil","instance":"Text_Caption_140","title":"a. ","roles":{"textData":{}}},{"id":"Text_Caption_141","class":"TODO::Senthil","instance":"Text_Caption_141","title":"Single-department access ","roles":{"textData":{}}},{"id":"Text_Caption_142","class":"TODO::Senthil","instance":"Text_Caption_142","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_143","class":"TODO::Senthil","instance":"Text_Caption_143","title":"Anti-virus software ","roles":{"textData":{}}},{"id":"Text_Caption_144","class":"TODO::Senthil","instance":"Text_Caption_144","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_145","class":"TODO::Senthil","instance":"Text_Caption_145","title":"Limited use of administrative privileges ","roles":{"textData":{}}},{"id":"Text_Caption_146","class":"TODO::Senthil","instance":"Text_Caption_146","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_147","class":"TODO::Senthil","instance":"Text_Caption_147","title":"Data encryption ","roles":{"textData":{}}},{"id":"Text_Caption_148","class":"TODO::Senthil","instance":"Text_Caption_148","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_149","class":"TODO::Senthil","instance":"Text_Caption_149","title":"Email filters ","roles":{"textData":{}}},{"id":"Text_Caption_150","class":"TODO::Senthil","instance":"Text_Caption_150","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_151","class":"TODO::Senthil","instance":"Text_Caption_151","title":"Limited number of users with remote network access ","roles":{"textData":{}}},{"id":"Text_Caption_152","class":"TODO::Senthil","instance":"Text_Caption_152","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_153","class":"TODO::Senthil","instance":"Text_Caption_153","title":"Firewalls ","roles":{"textData":{}}},{"id":"Text_Caption_154","class":"TODO::Senthil","instance":"Text_Caption_154","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_155","class":"TODO::Senthil","instance":"Text_Caption_155","title":"Locked doors and entry control ","roles":{"textData":{}}},{"id":"si30732","class":"TODO::Senthil","instance":"Text_Caption_156","title":"Control Type ","roles":{"textData":{}}},{"id":"si30736","class":"TODO::Senthil","instance":"Text_Caption_157","title":"a. ","roles":{"textData":{}}},{"id":"si30740","class":"TODO::Senthil","instance":"Text_Caption_158","title":"Access Control ","roles":{"textData":{}}},{"id":"si30740ans","class":"TODO::Senthil","roles":{"answer":{"title":"Access Control","index":"Not implemented"}}},{"id":"si30746","class":"TODO::Senthil","instance":"Text_Caption_159","title":"b. ","roles":{"textData":{}}},{"id":"si30750","class":"TODO::Senthil","instance":"Text_Caption_160","title":"Security Control ","roles":{"textData":{}}},{"id":"si30750ans","class":"TODO::Senthil","roles":{"answer":{"title":"Security Control","index":"Not implemented"}}},{"id":"si30823","class":"TODO::Senthil","instance":"Button_12","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide30898q11","for":"Slide30898q11"},"textData":{}}},{"id":"si30835","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide30898q11","for":"Slide30898q11"},"textData":{}}},{"id":"si30847","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide30898q11","for":"Slide30898q11"},"textData":{}}},{"id":"si30793","class":"TODO::Senthil","instance":"SmartShape_33","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide30898q11"},"textData":{}}},{"id":"si30884","class":"TODO::Senthil","instance":"SmartShape_35","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide30898q11"},"textData":{}}},{"id":"si33581","class":"TODO::Senthil","title":"Correct Answer: Access Controls: Single-department access, limited use of administrative privileges, limited number of users with remote network access, locked doors and entry control Security Controls: Anti-virus software, data encryption, email filters, firewalls Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide30898q11"},"textData":{}}},{"id":"Slide30898","class":"Question Slide","instance":"","thumbnail":"","children":["Image_33","si30616","si30628","si30740","si30750","si30823","si30835","si30847","si30793"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide30898"},"question":{"interactionId":"30532","quizId":379,"title":"Knowledge Check #4\r","text":"Identify which of the following are access controls and which are security controls.\r","type":"knowledgeCheck","ikc":true,"interactionType":"matching","ramdomized":false,"correctAnswers":[]}}},{"id":"Image_34","class":"TODO::Senthil","instance":"Image_34","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"textData":{}}},{"id":"si30944","class":"TODO::Senthil","instance":"Text_Caption_161","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si30956","class":"TODO::Senthil","instance":"Text_Caption_162","title":"At NAL Group, preparation is essential for the protection of our nonpublic information. Select all actions that are part of preparation. ","roles":{"textData":{}}},{"id":"si30967","class":"TODO::Senthil","instance":"Text_Caption_163","title":"a. ","roles":{"textData":{}}},{"id":"si30971","class":"TODO::Senthil","instance":"Text_Caption_164","title":"We patch network, system, and application vulnerability ","roles":{"textData":{}}},{"id":"si30971","class":"TODO::Senthil","instance":"70","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si30967_a","class":"TODO::Senthil","instance":"71","roles":{"answer":{"title":"We patch network, system, and application vulbnerability\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si30978","class":"TODO::Senthil","instance":"Text_Caption_165","title":"b. ","roles":{"textData":{}}},{"id":"si30982","class":"TODO::Senthil","instance":"Text_Caption_166","title":"We know how our network is structured, what systems we are running, and what data we are storing ","roles":{"textData":{}}},{"id":"si30982","class":"TODO::Senthil","instance":"72","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si30978_a","class":"TODO::Senthil","instance":"73","roles":{"answer":{"title":"We know how our network is structured, what systems we are running, and what dta we are storing\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si30989","class":"TODO::Senthil","instance":"Text_Caption_167","title":"c. ","roles":{"textData":{}}},{"id":"si30993","class":"TODO::Senthil","instance":"Text_Caption_168","title":"We plan for the unexpected ","roles":{"textData":{}}},{"id":"si30993","class":"TODO::Senthil","instance":"74","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si30989_a","class":"TODO::Senthil","instance":"75","roles":{"answer":{"title":"We plan for the unexpected\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31061","class":"TODO::Senthil","instance":"Button_13","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide31131q12","for":"Slide31131q12"},"textData":{}}},{"id":"si31073","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide31131q12","for":"Slide31131q12"},"textData":{}}},{"id":"si31085","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide31131q12","for":"Slide31131q12"},"textData":{}}},{"id":"si31031","class":"TODO::Senthil","instance":"SmartShape_36","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"textData":{}}},{"id":"si31117","class":"TODO::Senthil","instance":"SmartShape_38","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"textData":{}}},{"id":"si33686","class":"TODO::Senthil","title":"Correct Answer: We know how our network is structured, what systems we are running, and what data we are storing. AND We plan for the unexpected. Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide31131q12"},"textData":{}}},{"id":"Slide31131","class":"Question Slide","instance":"","thumbnail":"","children":["Image_34","si30944","si30956","si30971","si30982","si30993","si31061","si31073","si31085","si31031"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide31131"},"question":{"interactionId":"30917","quizId":379,"title":"Knowledge Check #4\r","text":"At NAL Group, preparation is essential for the protection of our nonpublic information. Select all actions that are part of preparation.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["b","c"]}}},{"id":"Image_35","class":"TODO::Senthil","instance":"Image_35","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"textData":{}}},{"id":"si31189","class":"TODO::Senthil","instance":"Text_Caption_169","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si31201","class":"TODO::Senthil","instance":"Text_Caption_170","title":"Select the 3 missing terms to complete this sentence: Risk assessment is the overall process of risk _____, risk _____, and risk _____. ","roles":{"textData":{}}},{"id":"si31212","class":"TODO::Senthil","instance":"Text_Caption_171","title":"a. ","roles":{"textData":{}}},{"id":"si31216","class":"TODO::Senthil","instance":"Text_Caption_172","title":"Protection ","roles":{"textData":{}}},{"id":"si31216","class":"TODO::Senthil","instance":"10_75","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si31212_a","class":"TODO::Senthil","instance":"52_76","roles":{"answer":{"title":"Protection\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31223","class":"TODO::Senthil","instance":"Text_Caption_173","title":"b. ","roles":{"textData":{}}},{"id":"si31227","class":"TODO::Senthil","instance":"Text_Caption_174","title":"Identifying ","roles":{"textData":{}}},{"id":"si31227","class":"TODO::Senthil","instance":"53_76","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si31223_a","class":"TODO::Senthil","instance":"54_77","roles":{"answer":{"title":"Identifying\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31234","class":"TODO::Senthil","instance":"Text_Caption_175","title":"c. ","roles":{"textData":{}}},{"id":"si31238","class":"TODO::Senthil","instance":"Text_Caption_176","title":"Detection ","roles":{"textData":{}}},{"id":"si31238","class":"TODO::Senthil","instance":"55_77","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si31234_a","class":"TODO::Senthil","instance":"56_78","roles":{"answer":{"title":"Detection\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31245","class":"TODO::Senthil","instance":"Text_Caption_177","title":"d. ","roles":{"textData":{}}},{"id":"si31249","class":"TODO::Senthil","instance":"Text_Caption_178","title":"Analysis ","roles":{"textData":{}}},{"id":"si31249","class":"TODO::Senthil","instance":"57_78","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si31245_a","class":"TODO::Senthil","instance":"58_79","roles":{"answer":{"title":"Analysis\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31256","class":"TODO::Senthil","instance":"Text_Caption_179","title":"e. ","roles":{"textData":{}}},{"id":"si31260","class":"TODO::Senthil","instance":"Text_Caption_180","title":"Authorization ","roles":{"textData":{}}},{"id":"si31260","class":"TODO::Senthil","instance":"59_79","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si31256_a","class":"TODO::Senthil","instance":"60_80","roles":{"answer":{"title":"Authorization\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31267","class":"TODO::Senthil","instance":"Text_Caption_181","title":"f. ","roles":{"textData":{}}},{"id":"si31271","class":"TODO::Senthil","instance":"Text_Caption_182","title":"Evaluation ","roles":{"textData":{}}},{"id":"si31271","class":"TODO::Senthil","instance":"61_80","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si31267_a","class":"TODO::Senthil","instance":"62_81","roles":{"answer":{"title":"Evaluation\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si31339","class":"TODO::Senthil","instance":"Button_14","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide31409q13","for":"Slide31409q13"},"textData":{}}},{"id":"si31351","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide31409q13","for":"Slide31409q13"},"textData":{}}},{"id":"si31363","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide31409q13","for":"Slide31409q13"},"textData":{}}},{"id":"si31309","class":"TODO::Senthil","instance":"SmartShape_39","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"textData":{}}},{"id":"si31395","class":"TODO::Senthil","instance":"SmartShape_41","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"textData":{}}},{"id":"si33699","class":"TODO::Senthil","title":"Correct Answer: Risk assessment is the overall process of risk identifying, risk analysis, and risk evaluation. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide31409q13"},"textData":{}}},{"id":"Slide31409","class":"Question Slide","instance":"","thumbnail":"","children":["Image_35","si31189","si31201","si31216","si31227","si31238","si31249","si31260","si31271","si31339","si31351","si31363","si31309"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide31409"},"question":{"interactionId":"31162","quizId":379,"title":"Knowledge Check #4\r","text":"Select the 3 missing terms to complete this sentence: Risk assessment is the overall process of risk _____, risk _____, and risk _____.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["b","d","f"]}}},{"id":"Click_Box_73","class":"TODO::Senthil","instance":"Click_Box_73","roles":{"click":{"subtype":"button"}}},{"id":"Slide6988","class":"PPTX Slide","instance":"End of Part 1 ","thumbnail":"","children":["Click_Box_73"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6988"}}},{"id":"Pool423","class":"pool","roles":{"pool":{"id":423,"name":"Pool1","questions":[]}}},{"id":"CyberSecurityDraft_Blue_Part1","class":"project","title":"CyberSecurityDraft_Blue_Part1","children":["Slide5836","Slide5852","Slide5868","Slide5884","Slide5900","Slide5916","Slide5932","Slide5948","Slide5980","Slide5996","Slide6012","Slide6044","Slide11009","Slide11258","Slide11614","Slide11848","Slide6140","Slide6156","Slide6188","Slide15293","Slide15626","Slide6236","Slide18904","Slide19260","Slide19509","Slide6316","Slide34030","Slide23014","Slide23471","Slide6364","Slide6380","Slide6412","Slide26734","Slide26952","Slide27260","Slide6492","Slide6508","Slide6524","Slide6540","Slide6572","Slide6588","Slide6620","Slide6652","Slide6668","Slide34222","Slide6700","Slide6732","Slide6748","Slide6764","Slide6796","Slide6812","Slide6844","Slide30523","Slide30898","Slide31131","Slide31409","Slide6988"],"roles":{"quiz":{"id":379,"branched":false,"submitAll":false,"review":true,"questions":["Slide11009q0","Slide11258q1","Slide11614q2","Slide11848q3","Slide18904q4","Slide19260q5","Slide19509q6","Slide26734q7","Slide26952q8","Slide27260q9","Slide30523q10","Slide30898q11","Slide31131q12","Slide31409q13"],"minScore":0,"maxScore":0,"passScore":0}}}],"contentSettings":{"global":{"branchAware":false},"toc":{"enabled":false},"playbar":{"enabled":true,"cc":true,"playPause":true,"back":true,"forward":true,"rewind":true,"close":true,"mute":true,"progressBar":true}},"contentReporting":{"CCCriteria":"view","CCData":{"viewDataIsPercent":true,"viewData":100},"SCCriteria":"view","SCData":{"viewDataIsPercent":true,"viewData":100},"exitNormalIfCompleted":false},"toc":[{"id":"Slide5836","title":"Cybersecurity ","visible":true},{"id":"Slide5852","title":"Cybersecurity ","visible":true},{"id":"Slide5868","title":"Welcome ","visible":true},{"id":"Slide5884","title":"About the Course ","visible":true},{"id":"Slide5900","title":"About the Course ","visible":true},{"id":"Slide5916","title":"Course Assessment ","visible":true},{"id":"Slide5932","title":"Sign Off ","visible":true},{"id":"Slide5948","title":"Cybersecurity Awareness ","visible":true},{"id":"Slide5980","title":"Cybersecurity Program ","visible":true},{"id":"Slide5996","title":"Purpose ","visible":true},{"id":"Slide6012","title":"Slide 12","visible":true},{"id":"Slide6044","title":"Self-Check ","visible":true},{"id":"Slide11009","title":"Slide 13","visible":true},{"id":"Slide11258","title":"Slide 14","visible":true},{"id":"Slide11614","title":"Slide 15","visible":true},{"id":"Slide11848","title":"Slide 16","visible":true},{"id":"Slide6140","title":"How do we Go about putting the CIS 20 Best Practices into action? ","visible":true},{"id":"Slide6156","title":"Risk Assessment ","visible":true},{"id":"Slide6188","title":"What is involved with a risk assessment? ","visible":true},{"id":"Slide15293","title":"Risk Assessment Steps 1","visible":true},{"id":"Slide15626","title":"Risk Assessment Steps 2","visible":true},{"id":"Slide6236","title":"Self-Check ","visible":true},{"id":"Slide18904","title":"Slide 23","visible":true},{"id":"Slide19260","title":"Slide 24","visible":true},{"id":"Slide19509","title":"Slide 25","visible":true},{"id":"Slide6316","title":"Inventory Assets ","visible":true},{"id":"Slide34030","title":"Threats ","visible":true},{"id":"Slide23014","title":"Types of Threats 1","visible":true},{"id":"Slide23471","title":"Types of Threats 2","visible":true},{"id":"Slide6364","title":"Slide 34","visible":true},{"id":"Slide6380","title":"Slide 35","visible":true},{"id":"Slide6412","title":"Self-Check ","visible":true},{"id":"Slide26734","title":"Slide 33","visible":true},{"id":"Slide26952","title":"Slide 34","visible":true},{"id":"Slide27260","title":"Slide 35","visible":true},{"id":"Slide6492","title":"What measures have we put into place to protect us from these threats? ","visible":true},{"id":"Slide6508","title":"Preparation is Essential ","visible":true},{"id":"Slide6524","title":"Prevention is Critical ","visible":true},{"id":"Slide6540","title":"Prevention is Critical ","visible":true},{"id":"Slide6572","title":"Access Controls ","visible":true},{"id":"Slide6588","title":"Security Controls ","visible":true},{"id":"Slide6620","title":"How do we respond to a cybersecurity event? ","visible":true},{"id":"Slide6652","title":"How do we respond to a cybersecurity event? ","visible":true},{"id":"Slide6668","title":"Analysis ","visible":true},{"id":"Slide34222","title":"Slide 45","visible":true},{"id":"Slide6700","title":"Mitigation ","visible":true},{"id":"Slide6732","title":"How do we recover from a cybersecurity event? ","visible":true},{"id":"Slide6748","title":"Road to Recovery ","visible":true},{"id":"Slide6764","title":"Road to Recovery ","visible":true},{"id":"Slide6796","title":"What are our reporting obligations? ","visible":true},{"id":"Slide6812","title":"Reporting Obligations ","visible":true},{"id":"Slide6844","title":"Self-Check ","visible":true},{"id":"Slide30523","title":"Slide 53","visible":true},{"id":"Slide30898","title":"Slide 54","visible":true},{"id":"Slide31131","title":"Slide 55","visible":true},{"id":"Slide31409","title":"Slide 56","visible":true},{"id":"Slide6988","title":"End of Part 1 ","visible":true}]}