{"metadata":{"generator":"Captivate","generatorVersion":"11.5.1","schemaVersion":"","author":"author","title":"CyberSecurityDraft_Blue_Agentj","description":"project description","email":"author@company.com","website":"www.company.com","tags":"","thumbnail":"","source":"assets","durationInFrames":95853,"frameRate":30,"totalSlides":97,"width":1280,"height":720,"responsive":false,"scalable":true,"launchFile":"index_scorm.html","isVRProject":false},"contentStructure":[{"id":"Click_Box_1","class":"TODO::Senthil","instance":"Click_Box_1","roles":{"click":{"subtype":"button"}}},{"id":"Slide5873","class":"PPTX Slide","instance":"Cybersecurity","thumbnail":"","children":["Click_Box_1"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide5873"}}},{"id":"Click_Box_2","class":"TODO::Senthil","instance":"Click_Box_2","roles":{"click":{"subtype":"button"}}},{"id":"Slide5889","class":"PPTX Slide","instance":"About the Course","thumbnail":"","children":["Click_Box_2"],"roles":{"slide":{"durationInFrames":342},"navigation":{"navid":"Slide5889"}}},{"id":"Click_Box_3","class":"TODO::Senthil","instance":"Click_Box_3","roles":{"click":{"subtype":"button"}}},{"id":"Slide5905","class":"PPTX Slide","instance":"About the Course","thumbnail":"","children":["Click_Box_3"],"roles":{"slide":{"durationInFrames":720},"navigation":{"navid":"Slide5905"}}},{"id":"Click_Box_4","class":"TODO::Senthil","instance":"Click_Box_4","roles":{"click":{"subtype":"button"}}},{"id":"Slide5921","class":"PPTX Slide","instance":"Course Assessment","thumbnail":"","children":["Click_Box_4"],"roles":{"slide":{"durationInFrames":663},"navigation":{"navid":"Slide5921"}}},{"id":"Click_Box_5","class":"TODO::Senthil","instance":"Click_Box_5","roles":{"click":{"subtype":"button"}}},{"id":"Slide5937","class":"PPTX Slide","instance":"Sign Off","thumbnail":"","children":["Click_Box_5"],"roles":{"slide":{"durationInFrames":492},"navigation":{"navid":"Slide5937"}}},{"id":"Click_Box_6","class":"TODO::Senthil","instance":"Click_Box_6","roles":{"click":{"subtype":"button"}}},{"id":"Slide5953","class":"PPTX Slide","instance":"Cybersecurity","thumbnail":"","children":["Click_Box_6"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide5953"}}},{"id":"Click_Box_7","class":"TODO::Senthil","instance":"Click_Box_7","roles":{"click":{"subtype":"button"}}},{"id":"Slide5969","class":"PPTX Slide","instance":"Welcome","thumbnail":"","children":["Click_Box_7"],"roles":{"slide":{"durationInFrames":1059},"navigation":{"navid":"Slide5969"}}},{"id":"Click_Box_8","class":"TODO::Senthil","instance":"Click_Box_8","roles":{"click":{"subtype":"button"}}},{"id":"Slide5985","class":"PPTX Slide","instance":"Cybersecurity Awareness","thumbnail":"","children":["Click_Box_8"],"roles":{"slide":{"durationInFrames":2298},"navigation":{"navid":"Slide5985"}}},{"id":"Click_Box_10","class":"TODO::Senthil","instance":"Click_Box_10","roles":{"click":{"subtype":"button"}}},{"id":"Slide6017","class":"PPTX Slide","instance":"Purpose","thumbnail":"","children":["Click_Box_10"],"roles":{"slide":{"durationInFrames":762},"navigation":{"navid":"Slide6017"}}},{"id":"Click_Box_73","class":"TODO::Senthil","instance":"Click_Box_73","roles":{"click":{"subtype":"button"}}},{"id":"Slide16954","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":["Click_Box_73"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide16954"}}},{"id":"Image_6","class":"TODO::Senthil","instance":"Image_6","roles":{"click":{"subtype":"button","question":"Slide16095q0"},"textData":{}}},{"id":"si15896","class":"TODO::Senthil","instance":"Text_Caption_3","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si15908","class":"TODO::Senthil","instance":"Text_Caption_4","title":"What is a computer network? ","roles":{"textData":{}}},{"id":"si15964","class":"TODO::Senthil","instance":"9_1","roles":{}},{"id":"si15920","class":"TODO::Senthil","instance":"Text_Caption_5","title":" ","roles":{"textData":{}}},{"id":"si15924","class":"TODO::Senthil","instance":"Text_Caption_6","title":"A super-computer owned by the government ","roles":{"textData":{}}},{"id":"si15920_a","class":"TODO::Senthil","instance":"2_1","roles":{"answer":{"title":"A super-computer owned by the government\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si15931","class":"TODO::Senthil","instance":"Text_Caption_7","title":" ","roles":{"textData":{}}},{"id":"si15935","class":"TODO::Senthil","instance":"Text_Caption_8","title":"A web of connected computers and devices ","roles":{"textData":{}}},{"id":"si15931_a","class":"TODO::Senthil","instance":"4_2","roles":{"answer":{"title":"A web of connected computers and devices\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si15942","class":"TODO::Senthil","instance":"Text_Caption_9","title":" ","roles":{"textData":{}}},{"id":"si15946","class":"TODO::Senthil","instance":"Text_Caption_10","title":"Internet service providers ","roles":{"textData":{}}},{"id":"si15942_a","class":"TODO::Senthil","instance":"6_3","roles":{"answer":{"title":"Internet service providers\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si15953","class":"TODO::Senthil","instance":"Text_Caption_11","title":" ","roles":{"textData":{}}},{"id":"si15957","class":"TODO::Senthil","instance":"Text_Caption_12","title":"A security threat ","roles":{"textData":{}}},{"id":"si15953_a","class":"TODO::Senthil","instance":"8_4","roles":{"answer":{"title":"A security threat\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16025","class":"TODO::Senthil","instance":"Button_3","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16095q0","for":"Slide16095q0"},"textData":{}}},{"id":"si16037","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16095q0","for":"Slide16095q0"},"textData":{}}},{"id":"si16049","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16095q0","for":"Slide16095q0"},"textData":{}}},{"id":"si15995","class":"TODO::Senthil","instance":"SmartShape_1","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide16095q0"},"textData":{}}},{"id":"si16068","class":"TODO::Senthil","instance":"SmartShape_2","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide16095q0"},"textData":{}}},{"id":"si16081","class":"TODO::Senthil","instance":"SmartShape_3","title":"Correct Answer: A web of connected computers and devices Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide16095q0"},"textData":{}}},{"id":"Slide16095","class":"Question Slide","instance":"","thumbnail":"","children":["Image_6","si15896","si15908","si15924","si15935","si15946","si15957","si16025","si16037","si16049","si15995"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide16095"},"question":{"interactionId":"15869","quizId":379,"title":"Knowledge Check #1\r","text":"What is a computer network?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["2"]}}},{"id":"Image_7","class":"TODO::Senthil","instance":"Image_7","roles":{"click":{"subtype":"button","question":"Slide16344q1"},"textData":{}}},{"id":"si16145","class":"TODO::Senthil","instance":"Text_Caption_13","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si16157","class":"TODO::Senthil","instance":"Text_Caption_14","title":"Why will cybersecurity always be a concern? ","roles":{"textData":{}}},{"id":"si16213","class":"TODO::Senthil","instance":"1_2","roles":{}},{"id":"si16169","class":"TODO::Senthil","instance":"Text_Caption_15","title":" ","roles":{"textData":{}}},{"id":"si16173","class":"TODO::Senthil","instance":"Text_Caption_16","title":"Because the Internet will never go away ","roles":{"textData":{}}},{"id":"si16169_a","class":"TODO::Senthil","instance":"2_5","roles":{"answer":{"title":"Because the Internet will never go away\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16180","class":"TODO::Senthil","instance":"Text_Caption_17","title":" ","roles":{"textData":{}}},{"id":"si16184","class":"TODO::Senthil","instance":"Text_Caption_18","title":"Because other countries will want what we have ","roles":{"textData":{}}},{"id":"si16180_a","class":"TODO::Senthil","instance":"4_6","roles":{"answer":{"title":"Because other countries will want what we have\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16191","class":"TODO::Senthil","instance":"Text_Caption_19","title":" ","roles":{"textData":{}}},{"id":"si16195","class":"TODO::Senthil","instance":"Text_Caption_20","title":"Criminals need them to steal identities ","roles":{"textData":{}}},{"id":"si16191_a","class":"TODO::Senthil","instance":"6_7","roles":{"answer":{"title":"Criminals need them to steal identies\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16202","class":"TODO::Senthil","instance":"Text_Caption_21","title":" ","roles":{"textData":{}}},{"id":"si16206","class":"TODO::Senthil","instance":"Text_Caption_22","title":"It is a side effect of Internet communication and linked systems ","roles":{"textData":{}}},{"id":"si16202_a","class":"TODO::Senthil","instance":"8_8","roles":{"answer":{"title":"It is a side effect of Internet communication and linked systems\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16274","class":"TODO::Senthil","instance":"Button_4","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16344q1","for":"Slide16344q1"},"textData":{}}},{"id":"si16286","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16344q1","for":"Slide16344q1"},"textData":{}}},{"id":"si16298","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16344q1","for":"Slide16344q1"},"textData":{}}},{"id":"si16244","class":"TODO::Senthil","instance":"SmartShape_4","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide16344q1"},"textData":{}}},{"id":"si16317","class":"TODO::Senthil","instance":"SmartShape_5","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide16344q1"},"textData":{}}},{"id":"si16330","class":"TODO::Senthil","instance":"SmartShape_6","title":"Correct Answer: It is a side effect of Internet communications and links systems. Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide16344q1"},"textData":{}}},{"id":"Slide16344","class":"Question Slide","instance":"","thumbnail":"","children":["Image_7","si16145","si16157","si16173","si16184","si16195","si16206","si16274","si16286","si16298","si16244"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide16344"},"question":{"interactionId":"16118","quizId":379,"title":"Knowledge Check #1\r","text":"Why will cybersecurity always be a concern?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["4"]}}},{"id":"Image_9","class":"TODO::Senthil","instance":"Image_9","roles":{"click":{"subtype":"button","question":"Slide16923q2"},"question":{"interactionId":"16714","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si16735","class":"TODO::Senthil","instance":"Text_Caption_45","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si16747","class":"TODO::Senthil","instance":"Text_Caption_46","title":"What are the CIS 20 best practices? ","roles":{"textData":{}}},{"id":"si16792","class":"TODO::Senthil","instance":"1_3","roles":{}},{"id":"si16759","class":"TODO::Senthil","instance":"Text_Caption_47","title":" ","roles":{"textData":{}}},{"id":"si16763","class":"TODO::Senthil","instance":"Text_Caption_48","title":"A cybersecurity awareness program based on recommendation from employees ","roles":{"textData":{}}},{"id":"si16759_a","class":"TODO::Senthil","instance":"2_9","roles":{"answer":{"title":"A cybersecurity awareness program based on recommendation from employees\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16770","class":"TODO::Senthil","instance":"Text_Caption_49","title":" ","roles":{"textData":{}}},{"id":"si16774","class":"TODO::Senthil","instance":"Text_Caption_50","title":"A series of 20 do’s and don’ts from Norton Security ","roles":{"textData":{}}},{"id":"si16770_a","class":"TODO::Senthil","instance":"4_10","roles":{"answer":{"title":"A series of 20 do’s and don’ts from Norton Security\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16781","class":"TODO::Senthil","instance":"Text_Caption_51","title":" ","roles":{"textData":{}}},{"id":"si16785","class":"TODO::Senthil","instance":"Text_Caption_52","title":"A cybersecurity awareness program based on the Center for Internet Security (CIS) Top 20 Critical Security best practices ","roles":{"textData":{}}},{"id":"si16781_a","class":"TODO::Senthil","instance":"6_11","roles":{"answer":{"title":"A cybersecurity awareness program based on the Center for Internet Security (CIS) Top 20 Critical Security best practices\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si16853","class":"TODO::Senthil","instance":"Button_6","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16923q2","for":"Slide16923q2"},"textData":{}}},{"id":"si16865","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16923q2","for":"Slide16923q2"},"textData":{}}},{"id":"si16877","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide16923q2","for":"Slide16923q2"},"textData":{}}},{"id":"si16823","class":"TODO::Senthil","instance":"SmartShape_10","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide16923q2"},"textData":{}}},{"id":"si16896","class":"TODO::Senthil","instance":"SmartShape_11","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide16923q2"},"textData":{}}},{"id":"si16909","class":"TODO::Senthil","instance":"SmartShape_12","title":" Correct Answer: A cybersecurity awareness program based on the Center for Internet Security (CIS) Top 20 Critical Security best practices Click anywhere to continue. ","roles":{"click":{"subtype":"button","question":"Slide16923q2"},"textData":{}}},{"id":"Slide16923","class":"Question Slide","instance":"","thumbnail":"","children":["Image_9","si16735","si16747","si16763","si16774","si16785","si16853","si16865","si16877","si16823"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide16923"},"question":{"interactionId":"16708","quizId":379,"title":"Knowledge Check #1\r","text":"What are the CIS 20 best practices?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["3"]}}},{"id":"Click_Box_11","class":"TODO::Senthil","instance":"Click_Box_11","roles":{"click":{"subtype":"button"}}},{"id":"Slide6033","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_11"],"roles":{"slide":{"durationInFrames":978},"navigation":{"navid":"Slide6033"}}},{"id":"Click_Box_12","class":"TODO::Senthil","instance":"Click_Box_12","roles":{"click":{"subtype":"button"}}},{"id":"Slide6049","class":"PPTX Slide","instance":"Access Controls","thumbnail":"","children":["Click_Box_12"],"roles":{"slide":{"durationInFrames":1314},"navigation":{"navid":"Slide6049"}}},{"id":"Click_Box_13","class":"TODO::Senthil","instance":"Click_Box_13","roles":{"click":{"subtype":"button"}}},{"id":"Slide6065","class":"PPTX Slide","instance":"Security Controls","thumbnail":"","children":["Click_Box_13"],"roles":{"slide":{"durationInFrames":732},"navigation":{"navid":"Slide6065"}}},{"id":"Click_Box_14","class":"TODO::Senthil","instance":"Click_Box_14","roles":{"click":{"subtype":"button"}}},{"id":"Slide6081","class":"PPTX Slide","instance":"What is meant by network and system security?","thumbnail":"","children":["Click_Box_14"],"roles":{"slide":{"durationInFrames":981},"navigation":{"navid":"Slide6081"}}},{"id":"Click_Box_15","class":"TODO::Senthil","instance":"Click_Box_15","roles":{"click":{"subtype":"button"}}},{"id":"Slide6097","class":"PPTX Slide","instance":"Network and System Security","thumbnail":"","children":["Click_Box_15"],"roles":{"slide":{"durationInFrames":1641},"navigation":{"navid":"Slide6097"}}},{"id":"Click_Box_16","class":"TODO::Senthil","instance":"Click_Box_16","roles":{"click":{"subtype":"button"}}},{"id":"Slide6113","class":"PPTX Slide","instance":"Network and System Security","thumbnail":"","children":["Click_Box_16"],"roles":{"slide":{"durationInFrames":471},"navigation":{"navid":"Slide6113"}}},{"id":"Click_Box_28","class":"TODO::Senthil","instance":"Click_Box_28","roles":{"click":{"subtype":"button"}}},{"id":"Slide6305","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":["Click_Box_28"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6305"}}},{"id":"Image_41","class":"TODO::Senthil","instance":"Image_41","roles":{"click":{"subtype":"button","question":"Slide48621q3"},"textData":{}}},{"id":"si48445","class":"TODO::Senthil","instance":"Text_Caption_333","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si48457","class":"TODO::Senthil","instance":"Text_Caption_334","title":"A network is a set of servers, computers, and other devices that are interconnected in the company called an intranet. ","roles":{"textData":{}}},{"id":"si48468","class":"TODO::Senthil","instance":"Text_Caption_335","title":" ","roles":{"textData":{}}},{"id":"si48472","class":"TODO::Senthil","instance":"Text_Caption_336","title":"True ","roles":{"textData":{}}},{"id":"si48468_a","class":"TODO::Senthil","instance":"19_149","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si48479","class":"TODO::Senthil","instance":"Text_Caption_337","title":" ","roles":{"textData":{}}},{"id":"si48483","class":"TODO::Senthil","instance":"Text_Caption_338","title":"False ","roles":{"textData":{}}},{"id":"si48479_a","class":"TODO::Senthil","instance":"21_150","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si48551","class":"TODO::Senthil","instance":"Button_38","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide48621q3","for":"Slide48621q3"},"textData":{}}},{"id":"si48563","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide48621q3","for":"Slide48621q3"},"textData":{}}},{"id":"si48575","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide48621q3","for":"Slide48621q3"},"textData":{}}},{"id":"si48521","class":"TODO::Senthil","instance":"SmartShape_106","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide48621q3"},"textData":{}}},{"id":"si48594","class":"TODO::Senthil","instance":"SmartShape_107","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide48621q3"},"textData":{}}},{"id":"si48607","class":"TODO::Senthil","instance":"SmartShape_108","title":"Correct Answer: True, a network is a set of servcers, computers, and other devices interconnected in the company called an intranet. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide48621q3"},"textData":{}}},{"id":"Slide48621","class":"Question Slide","instance":"","thumbnail":"","children":["Image_41","si48445","si48457","si48472","si48483","si48551","si48563","si48575","si48521"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide48621"},"question":{"interactionId":"48418","quizId":379,"title":"Knowledge Check #2\r","text":"A network is a set of servers, computers, and other devices that are interconnected in the company called an intranet.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_42","class":"TODO::Senthil","instance":"Image_42","roles":{"click":{"subtype":"button","question":"Slide48839q4"},"textData":{}}},{"id":"si48663","class":"TODO::Senthil","instance":"Text_Caption_339","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si48675","class":"TODO::Senthil","instance":"Text_Caption_340","title":"Our cybersecurity policy sets forth our policies and procedures for the protection of our information system and our nonpublic information stored on them. ","roles":{"textData":{}}},{"id":"si48686","class":"TODO::Senthil","instance":"Text_Caption_341","title":" ","roles":{"textData":{}}},{"id":"si48690","class":"TODO::Senthil","instance":"Text_Caption_342","title":"True ","roles":{"textData":{}}},{"id":"si48686_a","class":"TODO::Senthil","instance":"23_151","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si48697","class":"TODO::Senthil","instance":"Text_Caption_343","title":" ","roles":{"textData":{}}},{"id":"si48701","class":"TODO::Senthil","instance":"Text_Caption_344","title":"False ","roles":{"textData":{}}},{"id":"si48697_a","class":"TODO::Senthil","instance":"25_152","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si48769","class":"TODO::Senthil","instance":"Button_39","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide48839q4","for":"Slide48839q4"},"textData":{}}},{"id":"si48781","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide48839q4","for":"Slide48839q4"},"textData":{}}},{"id":"si48793","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide48839q4","for":"Slide48839q4"},"textData":{}}},{"id":"si48739","class":"TODO::Senthil","instance":"SmartShape_109","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide48839q4"},"textData":{}}},{"id":"si48812","class":"TODO::Senthil","instance":"SmartShape_110","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide48839q4"},"textData":{}}},{"id":"si48825","class":"TODO::Senthil","instance":"SmartShape_111","title":"Correct Answer: True, our cybersecurity policy sets forth our policies and procedures for the protection of our information systems and our nonpublic information. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide48839q4"},"textData":{}}},{"id":"Slide48839","class":"Question Slide","instance":"","thumbnail":"","children":["Image_42","si48663","si48675","si48690","si48701","si48769","si48781","si48793","si48739"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide48839"},"question":{"interactionId":"48636","quizId":379,"title":"Knowledge Check #2\r","text":"Type the question here","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_43","class":"TODO::Senthil","instance":"Image_43","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"textData":{}}},{"id":"si48885","class":"TODO::Senthil","instance":"Text_Caption_345","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si48897","class":"TODO::Senthil","instance":"Text_Caption_346","title":"Access to information systems is controlled in order to protect the confidentiality, integrity, and availability of nonpublic information. Select two things you should do to safeguard that information? ","roles":{"textData":{}}},{"id":"si48908","class":"TODO::Senthil","instance":"Text_Caption_347","title":"a. ","roles":{"textData":{}}},{"id":"si48912","class":"TODO::Senthil","instance":"Text_Caption_348","title":"We use Secure Sockets Layer (SSL) to provide communications security over our computer network ","roles":{"textData":{}}},{"id":"si48912","class":"TODO::Senthil","instance":"12_105","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si48908_a","class":"TODO::Senthil","instance":"13_106","roles":{"answer":{"title":"We use Secure Sockets Layer (SSL) to provide communications security over our computer network\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si48919","class":"TODO::Senthil","instance":"Text_Caption_349","title":"b. ","roles":{"textData":{}}},{"id":"si48923","class":"TODO::Senthil","instance":"Text_Caption_350","title":"We use email filters to remove spam and computer viruses ","roles":{"textData":{}}},{"id":"si48923","class":"TODO::Senthil","instance":"14_106","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si48919_a","class":"TODO::Senthil","instance":"15_107","roles":{"answer":{"title":"We use email filters to remove spam and computer viruses\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si48930","class":"TODO::Senthil","instance":"Text_Caption_351","title":"c. ","roles":{"textData":{}}},{"id":"si48934","class":"TODO::Senthil","instance":"Text_Caption_352","title":"We use DSL for a fast and safe connection ","roles":{"textData":{}}},{"id":"si48934","class":"TODO::Senthil","instance":"16_107","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si48930_a","class":"TODO::Senthil","instance":"17_108","roles":{"answer":{"title":"We use DSL for a fast and safe connection\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si49002","class":"TODO::Senthil","instance":"Button_40","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide49072q5","for":"Slide49072q5"},"textData":{}}},{"id":"si49014","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide49072q5","for":"Slide49072q5"},"textData":{}}},{"id":"si49026","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide49072q5","for":"Slide49072q5"},"textData":{}}},{"id":"si48972","class":"TODO::Senthil","instance":"SmartShape_112","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"textData":{}}},{"id":"si49039","class":"TODO::Senthil","instance":"SmartShape_39","title":"Try again ","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"textData":{}}},{"id":"si49058","class":"TODO::Senthil","instance":"SmartShape_113","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide49072q5"},"textData":{}}},{"id":"Slide49072","class":"Question Slide","instance":"","thumbnail":"","children":["Image_43","si48885","si48897","si48912","si48923","si48934","si49002","si49014","si49026","si48972","si49039"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide49072"},"question":{"interactionId":"48858","quizId":379,"title":"Knowledge Check #2\r","text":"Access to information systems is controlled in order to protect the confidentiality, integrity, and availability of nonpublic information. Select two things you should do to safeguard that information?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["a","b"]}}},{"id":"Click_Box_17","class":"TODO::Senthil","instance":"Click_Box_17","roles":{"click":{"subtype":"button"}}},{"id":"Slide6129","class":"PPTX Slide","instance":"What is Nonpublic Information?","thumbnail":"","children":["Click_Box_17"],"roles":{"slide":{"durationInFrames":882},"navigation":{"navid":"Slide6129"}}},{"id":"Click_Box_18","class":"TODO::Senthil","instance":"Click_Box_18","roles":{"click":{"subtype":"button"}}},{"id":"Slide6145","class":"PPTX Slide","instance":"Business-related information that the unauthorized access to, disclosure of, or use would cause an adverse material impact to our business, operations, or security.","thumbnail":"","children":["Click_Box_18"],"roles":{"slide":{"durationInFrames":396},"navigation":{"navid":"Slide6145"}}},{"id":"Click_Box_19","class":"TODO::Senthil","instance":"Click_Box_19","roles":{"click":{"subtype":"button"}}},{"id":"Slide6161","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_19"],"roles":{"slide":{"durationInFrames":981},"navigation":{"navid":"Slide6161"}}},{"id":"Click_Box_20","class":"TODO::Senthil","instance":"Click_Box_20","roles":{"click":{"subtype":"button"}}},{"id":"Slide6177","class":"PPTX Slide","instance":"Personal identification information which can be used to identify an individual.","thumbnail":"","children":["Click_Box_20"],"roles":{"slide":{"durationInFrames":1104},"navigation":{"navid":"Slide6177"}}},{"id":"Click_Box_21","class":"TODO::Senthil","instance":"Click_Box_21","roles":{"click":{"subtype":"button"}}},{"id":"Slide6193","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_21"],"roles":{"slide":{"durationInFrames":678},"navigation":{"navid":"Slide6193"}}},{"id":"Click_Box_22","class":"TODO::Senthil","instance":"Click_Box_22","roles":{"click":{"subtype":"button"}}},{"id":"Slide6209","class":"PPTX Slide","instance":"Protected health information (PHI), in any form or medium created by or derived from a health care provider or an individual and that relates to the past, present, or future health or condition of an individual or their family, provision of health care, or payment for provision of healthcare.","thumbnail":"","children":["Click_Box_22"],"roles":{"slide":{"durationInFrames":696},"navigation":{"navid":"Slide6209"}}},{"id":"Click_Box_23","class":"TODO::Senthil","instance":"Click_Box_23","roles":{"click":{"subtype":"button"}}},{"id":"Slide6225","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_23"],"roles":{"slide":{"durationInFrames":1398},"navigation":{"navid":"Slide6225"}}},{"id":"Click_Box_24","class":"TODO::Senthil","instance":"Click_Box_24","roles":{"click":{"subtype":"button"}}},{"id":"Slide6241","class":"PPTX Slide","instance":"Who Has Access?","thumbnail":"","children":["Click_Box_24"],"roles":{"slide":{"durationInFrames":552},"navigation":{"navid":"Slide6241"}}},{"id":"Click_Box_25","class":"TODO::Senthil","instance":"Click_Box_25","roles":{"click":{"subtype":"button"}}},{"id":"Slide6257","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_25"],"roles":{"slide":{"durationInFrames":765},"navigation":{"navid":"Slide6257"}}},{"id":"Click_Box_26","class":"TODO::Senthil","instance":"Click_Box_26","roles":{"click":{"subtype":"button"}}},{"id":"Slide6273","class":"PPTX Slide","instance":"User Responsibilities","thumbnail":"","children":["Click_Box_26"],"roles":{"slide":{"durationInFrames":1497},"navigation":{"navid":"Slide6273"}}},{"id":"Click_Box_27","class":"TODO::Senthil","instance":"Click_Box_27","roles":{"click":{"subtype":"button"}}},{"id":"Slide6289","class":"PPTX Slide","instance":"Former Employees","thumbnail":"","children":["Click_Box_27"],"roles":{"slide":{"durationInFrames":990},"navigation":{"navid":"Slide6289"}}},{"id":"Click_Box_74","class":"TODO::Senthil","instance":"Click_Box_74","roles":{"click":{"subtype":"button"}}},{"id":"Slide44487","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":["Click_Box_74"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide44487"}}},{"id":"Image_19","class":"TODO::Senthil","instance":"Image_19","roles":{"click":{"subtype":"button","question":"Slide28602q6"},"textData":{}}},{"id":"si28349","class":"TODO::Senthil","instance":"Text_Caption_141","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si28361","class":"TODO::Senthil","instance":"Text_Caption_142","title":"Which of the following can be considered nonpublic information? ","roles":{"textData":{}}},{"id":"si28372","class":"TODO::Senthil","instance":"Text_Caption_143","title":"a. ","roles":{"textData":{}}},{"id":"si28376","class":"TODO::Senthil","instance":"Text_Caption_144","title":"Business related information ","roles":{"textData":{}}},{"id":"si28372_a","class":"TODO::Senthil","instance":"27","roles":{"answer":{"title":"Business related information\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28383","class":"TODO::Senthil","instance":"Text_Caption_145","title":"b. ","roles":{"textData":{}}},{"id":"si28387","class":"TODO::Senthil","instance":"Text_Caption_146","title":"Any security code, access code, or password that permits access to a financial account ","roles":{"textData":{}}},{"id":"si28383_a","class":"TODO::Senthil","instance":"29","roles":{"answer":{"title":"Any security code, access code, or password that permits access to a financial account\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28394","class":"TODO::Senthil","instance":"Text_Caption_147","title":"c. ","roles":{"textData":{}}},{"id":"si28398","class":"TODO::Senthil","instance":"Text_Caption_148","title":"Driver’s license number ","roles":{"textData":{}}},{"id":"si28394_a","class":"TODO::Senthil","instance":"31","roles":{"answer":{"title":"Driver’s license number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28405","class":"TODO::Senthil","instance":"Text_Caption_149","title":"d. ","roles":{"textData":{}}},{"id":"si28409","class":"TODO::Senthil","instance":"Text_Caption_150","title":"Credit or debit card number ","roles":{"textData":{}}},{"id":"si28405_a","class":"TODO::Senthil","instance":"33","roles":{"answer":{"title":"Credit or debit card number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28416","class":"TODO::Senthil","instance":"Text_Caption_151","title":"e. ","roles":{"textData":{}}},{"id":"si28420","class":"TODO::Senthil","instance":"Text_Caption_152","title":"Passport number ","roles":{"textData":{}}},{"id":"si28416_a","class":"TODO::Senthil","instance":"35","roles":{"answer":{"title":"Passport number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28427","class":"TODO::Senthil","instance":"Text_Caption_153","title":"f. ","roles":{"textData":{}}},{"id":"si28431","class":"TODO::Senthil","instance":"Text_Caption_154","title":"Social Security Identification number (SSI) ","roles":{"textData":{}}},{"id":"si28427_a","class":"TODO::Senthil","instance":"37","roles":{"answer":{"title":"Social Security Identification number (SSI)\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28438","class":"TODO::Senthil","instance":"Text_Caption_155","title":"g. ","roles":{"textData":{}}},{"id":"si28442","class":"TODO::Senthil","instance":"Text_Caption_156","title":"Financial account number ","roles":{"textData":{}}},{"id":"si28438_a","class":"TODO::Senthil","instance":"39","roles":{"answer":{"title":"Financial account number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28449","class":"TODO::Senthil","instance":"Text_Caption_157","title":"h. ","roles":{"textData":{}}},{"id":"si28453","class":"TODO::Senthil","instance":"Text_Caption_158","title":"Protected health information ","roles":{"textData":{}}},{"id":"si28449_a","class":"TODO::Senthil","instance":"41","roles":{"answer":{"title":"Protected health information\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28460","class":"TODO::Senthil","instance":"Text_Caption_159","title":"i. ","roles":{"textData":{}}},{"id":"si28464","class":"TODO::Senthil","instance":"Text_Caption_160","title":"All of the above ","roles":{"textData":{}}},{"id":"si28460_a","class":"TODO::Senthil","instance":"43","roles":{"answer":{"title":"All of the above \r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28532","class":"TODO::Senthil","instance":"Button_16","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide28602q6","for":"Slide28602q6"},"textData":{}}},{"id":"si28544","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide28602q6","for":"Slide28602q6"},"textData":{}}},{"id":"si28556","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide28602q6","for":"Slide28602q6"},"textData":{}}},{"id":"si28502","class":"TODO::Senthil","instance":"SmartShape_40","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide28602q6"},"textData":{}}},{"id":"si28575","class":"TODO::Senthil","instance":"SmartShape_41","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide28602q6"},"textData":{}}},{"id":"si28588","class":"TODO::Senthil","instance":"SmartShape_42","title":"Correct Answer: All of the above Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide28602q6"},"textData":{}}},{"id":"Slide28602","class":"Question Slide","instance":"","thumbnail":"","children":["Image_19","si28349","si28361","si28376","si28387","si28398","si28409","si28420","si28431","si28442","si28453","si28464","si28532","si28544","si28556","si28502"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide28602"},"question":{"interactionId":"28322","quizId":379,"title":"Knowledge Check #3\r","text":"Which of the following can be considered nonpublic information?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["i"]}}},{"id":"Image_22","class":"TODO::Senthil","instance":"Image_22","roles":{"click":{"subtype":"button","question":"Slide32270q7"},"textData":{}}},{"id":"si32094","class":"TODO::Senthil","instance":"Text_Caption_179","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si32106","class":"TODO::Senthil","instance":"Text_Caption_180","title":"As part of our cyber security policy, we limit user access privileges for information systems that provide access to nonpublic information. ","roles":{"textData":{}}},{"id":"si32117","class":"TODO::Senthil","instance":"Text_Caption_181","title":"a. ","roles":{"textData":{}}},{"id":"si32121","class":"TODO::Senthil","instance":"Text_Caption_182","title":"True ","roles":{"textData":{}}},{"id":"si32117_a","class":"TODO::Senthil","instance":"62","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si32128","class":"TODO::Senthil","instance":"Text_Caption_183","title":"b. ","roles":{"textData":{}}},{"id":"si32132","class":"TODO::Senthil","instance":"Text_Caption_184","title":"False ","roles":{"textData":{}}},{"id":"si32128_a","class":"TODO::Senthil","instance":"64","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si32200","class":"TODO::Senthil","instance":"Button_19","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32270q7","for":"Slide32270q7"},"textData":{}}},{"id":"si32212","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32270q7","for":"Slide32270q7"},"textData":{}}},{"id":"si32224","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32270q7","for":"Slide32270q7"},"textData":{}}},{"id":"si32170","class":"TODO::Senthil","instance":"SmartShape_49","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide32270q7"},"textData":{}}},{"id":"si32243","class":"TODO::Senthil","instance":"SmartShape_50","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide32270q7"},"textData":{}}},{"id":"si32256","class":"TODO::Senthil","instance":"SmartShape_51","title":"Correct Answer: True, as part of our cyber security policy, we limit user access privileges for information systems that provide access to nonpublic information Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide32270q7"},"textData":{}}},{"id":"Slide32270","class":"Question Slide","instance":"","thumbnail":"","children":["Image_22","si32094","si32106","si32121","si32132","si32200","si32212","si32224","si32170"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide32270"},"question":{"interactionId":"32067","quizId":379,"title":"Knowledge Check #3\r","text":"As part of our cyber security policy, we limit user access privileges for information systems that provide access to nonpublic information.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_20","class":"TODO::Senthil","instance":"Image_20","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"textData":{}}},{"id":"si28652","class":"TODO::Senthil","instance":"Text_Caption_161","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si28664","class":"TODO::Senthil","instance":"Text_Caption_162","title":"Protecting nonpublic information and company data is part of your responsibility as an employee. Select all actions that you should take to protect this data. ","roles":{"textData":{}}},{"id":"si28675","class":"TODO::Senthil","instance":"Text_Caption_163","title":"a. ","roles":{"textData":{}}},{"id":"si28679","class":"TODO::Senthil","instance":"Text_Caption_164","title":"Leave your device in the seat in your car ","roles":{"textData":{}}},{"id":"si28679","class":"TODO::Senthil","instance":"45","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si28675_a","class":"TODO::Senthil","instance":"46","roles":{"answer":{"title":"Leave your device in the seat in your car\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28686","class":"TODO::Senthil","instance":"Text_Caption_165","title":"b. ","roles":{"textData":{}}},{"id":"si28690","class":"TODO::Senthil","instance":"Text_Caption_166","title":"Do not access email from personal devices ","roles":{"textData":{}}},{"id":"si28690","class":"TODO::Senthil","instance":"47","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si28686_a","class":"TODO::Senthil","instance":"48","roles":{"answer":{"title":"Do not access email from personal devices\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28697","class":"TODO::Senthil","instance":"Text_Caption_167","title":"c. ","roles":{"textData":{}}},{"id":"si28701","class":"TODO::Senthil","instance":"Text_Caption_168","title":"Send nonpublic information from secure email ","roles":{"textData":{}}},{"id":"si28701","class":"TODO::Senthil","instance":"49","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si28697_a","class":"TODO::Senthil","instance":"50","roles":{"answer":{"title":"Send nonpublic information from secure email \r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28708","class":"TODO::Senthil","instance":"Text_Caption_169","title":"d. ","roles":{"textData":{}}},{"id":"si28712","class":"TODO::Senthil","instance":"Text_Caption_170","title":"Copy your system passwords to your personal cell phone ","roles":{"textData":{}}},{"id":"si28712","class":"TODO::Senthil","instance":"51","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si28708_a","class":"TODO::Senthil","instance":"52","roles":{"answer":{"title":"Copy your system passwords to your personal cell phone\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si28780","class":"TODO::Senthil","instance":"Button_17","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide28850q8","for":"Slide28850q8"},"textData":{}}},{"id":"si28792","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide28850q8","for":"Slide28850q8"},"textData":{}}},{"id":"si28804","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide28850q8","for":"Slide28850q8"},"textData":{}}},{"id":"si28750","class":"TODO::Senthil","instance":"SmartShape_43","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"textData":{}}},{"id":"si28823","class":"TODO::Senthil","instance":"SmartShape_44","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"textData":{}}},{"id":"si28836","class":"TODO::Senthil","instance":"SmartShape_45","title":"Correct Answers: Do not share your passwords or other access infomration AND any authorized devices must be password protected and encrypted. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide28850q8"},"textData":{}}},{"id":"Slide28850","class":"Question Slide","instance":"","thumbnail":"","children":["Image_20","si28652","si28664","si28679","si28690","si28701","si28712","si28780","si28792","si28804","si28750"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide28850"},"question":{"interactionId":"28625","quizId":379,"title":"Knowledge Check #3\r","text":"Protecting nonpublic information and company data is part of your responsibility as an employee. \rSelect all actions that you should take to protect this data.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["b","c"]}}},{"id":"Image_14","class":"TODO::Senthil","instance":"Image_14","roles":{"click":{"subtype":"button","question":"Slide24408q9"},"textData":{}}},{"id":"si24125","class":"TODO::Senthil","instance":"Text_Caption_89","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si24137","class":"TODO::Senthil","instance":"Text_Caption_90","title":"Identify which of the following are access controls and which are security controls. ","roles":{"textData":{}}},{"id":"si24144","class":"TODO::Senthil","instance":"Text_Caption_91","title":"Action ","roles":{"textData":{}}},{"id":"Text_Caption_92","class":"TODO::Senthil","instance":"Text_Caption_92","title":"a. ","roles":{"textData":{}}},{"id":"Text_Caption_93","class":"TODO::Senthil","instance":"Text_Caption_93","title":"Single-department access ","roles":{"textData":{}}},{"id":"Text_Caption_94","class":"TODO::Senthil","instance":"Text_Caption_94","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_95","class":"TODO::Senthil","instance":"Text_Caption_95","title":"Anti-virus software ","roles":{"textData":{}}},{"id":"Text_Caption_96","class":"TODO::Senthil","instance":"Text_Caption_96","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_97","class":"TODO::Senthil","instance":"Text_Caption_97","title":"Limited use of administrative privileges ","roles":{"textData":{}}},{"id":"Text_Caption_98","class":"TODO::Senthil","instance":"Text_Caption_98","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_99","class":"TODO::Senthil","instance":"Text_Caption_99","title":"Data encryption ","roles":{"textData":{}}},{"id":"Text_Caption_100","class":"TODO::Senthil","instance":"Text_Caption_100","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_101","class":"TODO::Senthil","instance":"Text_Caption_101","title":"Email filters ","roles":{"textData":{}}},{"id":"Text_Caption_102","class":"TODO::Senthil","instance":"Text_Caption_102","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_103","class":"TODO::Senthil","instance":"Text_Caption_103","title":"Limited number of users with remote network access ","roles":{"textData":{}}},{"id":"Text_Caption_104","class":"TODO::Senthil","instance":"Text_Caption_104","title":"b. ","roles":{"textData":{}}},{"id":"Text_Caption_105","class":"TODO::Senthil","instance":"Text_Caption_105","title":"Firewalls ","roles":{"textData":{}}},{"id":"Text_Caption_106","class":"TODO::Senthil","instance":"Text_Caption_106","title":"a ","roles":{"textData":{}}},{"id":"Text_Caption_107","class":"TODO::Senthil","instance":"Text_Caption_107","title":"Locked doors and entry control ","roles":{"textData":{}}},{"id":"si24241","class":"TODO::Senthil","instance":"Text_Caption_108","title":"Control Type ","roles":{"textData":{}}},{"id":"si24245","class":"TODO::Senthil","instance":"Text_Caption_109","title":"a. ","roles":{"textData":{}}},{"id":"si24249","class":"TODO::Senthil","instance":"Text_Caption_110","title":"Access Control ","roles":{"textData":{}}},{"id":"si24249ans","class":"TODO::Senthil","roles":{"answer":{"title":"Access Control","index":"Not implemented"}}},{"id":"si24255","class":"TODO::Senthil","instance":"Text_Caption_111","title":"b. ","roles":{"textData":{}}},{"id":"si24259","class":"TODO::Senthil","instance":"Text_Caption_112","title":"Security Control ","roles":{"textData":{}}},{"id":"si24259ans","class":"TODO::Senthil","roles":{"answer":{"title":"Security Control","index":"Not implemented"}}},{"id":"si24332","class":"TODO::Senthil","instance":"Button_11","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide24408q9","for":"Slide24408q9"},"textData":{}}},{"id":"si24344","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide24408q9","for":"Slide24408q9"},"textData":{}}},{"id":"si24356","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide24408q9","for":"Slide24408q9"},"textData":{}}},{"id":"si24302","class":"TODO::Senthil","instance":"SmartShape_25","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide24408q9"},"textData":{}}},{"id":"si24380","class":"TODO::Senthil","instance":"SmartShape_26","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide24408q9"},"textData":{}}},{"id":"si24394","class":"TODO::Senthil","instance":"SmartShape_27","title":"Correct Answer: Access Controls: Single-department access, limited use of administrative privileges, limited number of users with remote network access, locked doors and entry control Security Controls: Anti-virus software, data encryption, email filters, firewalls Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide24408q9"},"textData":{}}},{"id":"Slide24408","class":"Question Slide","instance":"","thumbnail":"","children":["Image_14","si24125","si24137","si24249","si24259","si24332","si24344","si24356","si24302"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide24408"},"question":{"interactionId":"24041","quizId":379,"title":"Knowledge Check #3\r","text":"Identify which of the following are access controls and which are security controls.\r","type":"knowledgeCheck","ikc":true,"interactionType":"matching","ramdomized":false,"correctAnswers":[]}}},{"id":"Click_Box_29","class":"TODO::Senthil","instance":"Click_Box_29","roles":{"click":{"subtype":"button"}}},{"id":"Slide6321","class":"PPTX Slide","instance":"Data Control & Access","thumbnail":"","children":["Click_Box_29"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6321"}}},{"id":"Click_Box_30","class":"TODO::Senthil","instance":"Click_Box_30","roles":{"click":{"subtype":"button"}}},{"id":"Slide6337","class":"PPTX Slide","instance":"Data Control and Access","thumbnail":"","children":["Click_Box_30"],"roles":{"slide":{"durationInFrames":1125},"navigation":{"navid":"Slide6337"}}},{"id":"Click_Box_31","class":"TODO::Senthil","instance":"Click_Box_31","roles":{"click":{"subtype":"button"}}},{"id":"Slide6353","class":"PPTX Slide","instance":"Internal Control and Access","thumbnail":"","children":["Click_Box_31"],"roles":{"slide":{"durationInFrames":912},"navigation":{"navid":"Slide6353"}}},{"id":"Click_Box_32","class":"TODO::Senthil","instance":"Click_Box_32","roles":{"click":{"subtype":"button"}}},{"id":"Slide6369","class":"PPTX Slide","instance":"Internal Control and Access","thumbnail":"","children":["Click_Box_32"],"roles":{"slide":{"durationInFrames":738},"navigation":{"navid":"Slide6369"}}},{"id":"Click_Box_33","class":"TODO::Senthil","instance":"Click_Box_33","roles":{"click":{"subtype":"button"}}},{"id":"Slide6385","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_33"],"roles":{"slide":{"durationInFrames":159},"navigation":{"navid":"Slide6385"}}},{"id":"Click_Box_34","class":"TODO::Senthil","instance":"Click_Box_34","roles":{"click":{"subtype":"button"}}},{"id":"Slide6401","class":"PPTX Slide","instance":"Internal Control and Access","thumbnail":"","children":["Click_Box_34"],"roles":{"slide":{"durationInFrames":567},"navigation":{"navid":"Slide6401"}}},{"id":"Click_Box_35","class":"TODO::Senthil","instance":"Click_Box_35","roles":{"click":{"subtype":"button"}}},{"id":"Slide6417","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_35"],"roles":{"slide":{"durationInFrames":1077},"navigation":{"navid":"Slide6417"}}},{"id":"Click_Box_36","class":"TODO::Senthil","instance":"Click_Box_36","roles":{"click":{"subtype":"button"}}},{"id":"Slide6433","class":"PPTX Slide","instance":"Disaster Recovery & Business Continuity","thumbnail":"","children":["Click_Box_36"],"roles":{"slide":{"durationInFrames":690},"navigation":{"navid":"Slide6433"}}},{"id":"Click_Box_37","class":"TODO::Senthil","instance":"Click_Box_37","roles":{"click":{"subtype":"button"}}},{"id":"Slide6449","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":["Click_Box_37"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6449"}}},{"id":"Image_23","class":"TODO::Senthil","instance":"Image_23","roles":{"click":{"subtype":"button","question":"Slide32488q10"},"textData":{}}},{"id":"si32312","class":"TODO::Senthil","instance":"Text_Caption_185","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si32324","class":"TODO::Senthil","instance":"Text_Caption_186","title":"It is OK to leave your computer unlocked if you are just leaving it unattended for a few minutes. ","roles":{"textData":{}}},{"id":"si32335","class":"TODO::Senthil","instance":"Text_Caption_187","title":"a. ","roles":{"textData":{}}},{"id":"si32339","class":"TODO::Senthil","instance":"Text_Caption_188","title":"True ","roles":{"textData":{}}},{"id":"si32335_a","class":"TODO::Senthil","instance":"12_65","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si32346","class":"TODO::Senthil","instance":"Text_Caption_189","title":"b. ","roles":{"textData":{}}},{"id":"si32350","class":"TODO::Senthil","instance":"Text_Caption_190","title":"False ","roles":{"textData":{}}},{"id":"si32346_a","class":"TODO::Senthil","instance":"14_66","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si32418","class":"TODO::Senthil","instance":"Button_20","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32488q10","for":"Slide32488q10"},"textData":{}}},{"id":"si32430","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32488q10","for":"Slide32488q10"},"textData":{}}},{"id":"si32442","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32488q10","for":"Slide32488q10"},"textData":{}}},{"id":"si32388","class":"TODO::Senthil","instance":"SmartShape_52","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide32488q10"},"textData":{}}},{"id":"si32461","class":"TODO::Senthil","instance":"SmartShape_53","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide32488q10"},"textData":{}}},{"id":"si32474","class":"TODO::Senthil","instance":"SmartShape_54","title":"Correct Answer: False, you should never leave your computer unattended and unlocked. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide32488q10"},"textData":{}}},{"id":"Slide32488","class":"Question Slide","instance":"","thumbnail":"","children":["Image_23","si32312","si32324","si32339","si32350","si32418","si32430","si32442","si32388"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide32488"},"question":{"interactionId":"32285","quizId":379,"title":"Knowledge Check #4\r","text":"It is OK to leave your computer unlocked if you are just leaving it unattended for a few minutes.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["b"]}}},{"id":"Image_44","class":"TODO::Senthil","instance":"Image_44","roles":{"click":{"subtype":"button","question":"Slide49290q11"},"textData":{}}},{"id":"si49114","class":"TODO::Senthil","instance":"Text_Caption_353","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si49126","class":"TODO::Senthil","instance":"Text_Caption_354","title":"Because third-party companies work with us, they don’t need to use the Guest access when they are onsite. ","roles":{"textData":{}}},{"id":"si49137","class":"TODO::Senthil","instance":"Text_Caption_355","title":"a. ","roles":{"textData":{}}},{"id":"si49141","class":"TODO::Senthil","instance":"Text_Caption_356","title":"True ","roles":{"textData":{}}},{"id":"si49137_a","class":"TODO::Senthil","instance":"125_153","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si49148","class":"TODO::Senthil","instance":"Text_Caption_357","title":"b. ","roles":{"textData":{}}},{"id":"si49152","class":"TODO::Senthil","instance":"Text_Caption_358","title":"False ","roles":{"textData":{}}},{"id":"si49148_a","class":"TODO::Senthil","instance":"127_154","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si49220","class":"TODO::Senthil","instance":"Button_41","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide49290q11","for":"Slide49290q11"},"textData":{}}},{"id":"si49232","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide49290q11","for":"Slide49290q11"},"textData":{}}},{"id":"si49244","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide49290q11","for":"Slide49290q11"},"textData":{}}},{"id":"si49190","class":"TODO::Senthil","instance":"SmartShape_114","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide49290q11"},"textData":{}}},{"id":"si49263","class":"TODO::Senthil","instance":"SmartShape_115","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide49290q11"},"textData":{}}},{"id":"si49276","class":"TODO::Senthil","instance":"SmartShape_116","title":"Correct Answer: False, all visitors need to use a Guest account, as this restricts their access and limits our exposure to potenital threats. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide49290q11"},"textData":{}}},{"id":"Slide49290","class":"Question Slide","instance":"","thumbnail":"","children":["Image_44","si49114","si49126","si49141","si49152","si49220","si49232","si49244","si49190"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide49290"},"question":{"interactionId":"49087","quizId":379,"title":"Knowledge Check #4\r","text":"Because third-party companies work with us, they don’t need to use the Guest access when they are onsite.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["b"]}}},{"id":"Image_24","class":"TODO::Senthil","instance":"Image_24","roles":{"click":{"subtype":"button","question":"Slide32706q12"},"question":{"interactionId":"32509","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si32530","class":"TODO::Senthil","instance":"Text_Caption_191","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si32542","class":"TODO::Senthil","instance":"Text_Caption_192","title":"You should report all actual or potential unauthorized access to, use of, or disclosure of nonpublic information to the Help Desk. ","roles":{"textData":{}}},{"id":"si32553","class":"TODO::Senthil","instance":"Text_Caption_193","title":"a. ","roles":{"textData":{}}},{"id":"si32557","class":"TODO::Senthil","instance":"Text_Caption_194","title":"True ","roles":{"textData":{}}},{"id":"si32553_a","class":"TODO::Senthil","instance":"2_67","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si32564","class":"TODO::Senthil","instance":"Text_Caption_195","title":"b. ","roles":{"textData":{}}},{"id":"si32568","class":"TODO::Senthil","instance":"Text_Caption_196","title":"False ","roles":{"textData":{}}},{"id":"si32564_a","class":"TODO::Senthil","instance":"4_68","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si32636","class":"TODO::Senthil","instance":"Button_21","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32706q12","for":"Slide32706q12"},"textData":{}}},{"id":"si32648","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32706q12","for":"Slide32706q12"},"textData":{}}},{"id":"si32660","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide32706q12","for":"Slide32706q12"},"textData":{}}},{"id":"si32606","class":"TODO::Senthil","instance":"SmartShape_55","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide32706q12"},"textData":{}}},{"id":"si32679","class":"TODO::Senthil","instance":"SmartShape_56","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide32706q12"},"textData":{}}},{"id":"si32692","class":"TODO::Senthil","instance":"SmartShape_57","title":"Correct Answer: True, all actual or potential authorized access to, use of , or disclosure of nonpublin infomration should be reported to the Help Desk. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide32706q12"},"textData":{}}},{"id":"Slide32706","class":"Question Slide","instance":"","thumbnail":"","children":["Image_24","si32530","si32542","si32557","si32568","si32636","si32648","si32660","si32606"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide32706"},"question":{"interactionId":"32503","quizId":379,"title":"Knowledge Check #4\r","text":"You should report all actual or potential unauthorized access to, use of, or disclosure of nonpublic information to the Help Desk.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Click_Box_38","class":"TODO::Senthil","instance":"Click_Box_38","roles":{"click":{"subtype":"button"}}},{"id":"Slide6465","class":"PPTX Slide","instance":"Learner Activity","thumbnail":"","children":["Click_Box_38"],"roles":{"slide":{"durationInFrames":468},"navigation":{"navid":"Slide6465"}}},{"id":"Click_Box_39","class":"TODO::Senthil","instance":"Click_Box_39","roles":{"click":{"subtype":"button"}}},{"id":"Slide6481","class":"PPTX Slide","instance":"Employee Responsibilities & Best Practices","thumbnail":"","children":["Click_Box_39"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6481"}}},{"id":"Click_Box_40","class":"TODO::Senthil","instance":"Click_Box_40","roles":{"click":{"subtype":"button"}}},{"id":"Slide6497","class":"PPTX Slide","instance":"Never underestimate your importance to cybersecurity.","thumbnail":"","children":["Click_Box_40"],"roles":{"slide":{"durationInFrames":1251},"navigation":{"navid":"Slide6497"}}},{"id":"Click_Box_41","class":"TODO::Senthil","instance":"Click_Box_41","roles":{"click":{"subtype":"button"}}},{"id":"Slide6513","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_41"],"roles":{"slide":{"durationInFrames":138},"navigation":{"navid":"Slide6513"}}},{"id":"Click_Box_42","class":"TODO::Senthil","instance":"Click_Box_42","roles":{"click":{"subtype":"button"}}},{"id":"Slide6529","class":"PPTX Slide","instance":"Best Practices - Passwords","thumbnail":"","children":["Click_Box_42"],"roles":{"slide":{"durationInFrames":1068},"navigation":{"navid":"Slide6529"}}},{"id":"Click_Box_43","class":"TODO::Senthil","instance":"Click_Box_43","roles":{"click":{"subtype":"button"}}},{"id":"Slide6545","class":"PPTX Slide","instance":"Best Practices - Passwords","thumbnail":"","children":["Click_Box_43"],"roles":{"slide":{"durationInFrames":492},"navigation":{"navid":"Slide6545"}}},{"id":"Click_Box_44","class":"TODO::Senthil","instance":"Click_Box_44","roles":{"click":{"subtype":"button"}}},{"id":"Slide6561","class":"PPTX Slide","instance":"Password Hints","thumbnail":"","children":["Click_Box_44"],"roles":{"slide":{"durationInFrames":1644},"navigation":{"navid":"Slide6561"}}},{"id":"Click_Box_45","class":"TODO::Senthil","instance":"Click_Box_45","roles":{"click":{"subtype":"button"}}},{"id":"Slide6577","class":"PPTX Slide","instance":"Password Security","thumbnail":"","children":["Click_Box_45"],"roles":{"slide":{"durationInFrames":867},"navigation":{"navid":"Slide6577"}}},{"id":"Click_Box_46","class":"TODO::Senthil","instance":"Click_Box_46","roles":{"click":{"subtype":"button"}}},{"id":"Slide6593","class":"PPTX Slide","instance":"Personal Owned Devices Policy","thumbnail":"","children":["Click_Box_46"],"roles":{"slide":{"durationInFrames":3165},"navigation":{"navid":"Slide6593"}}},{"id":"Click_Box_47","class":"TODO::Senthil","instance":"Click_Box_47","roles":{"click":{"subtype":"button"}}},{"id":"Slide6609","class":"PPTX Slide","instance":"Internet Usage","thumbnail":"","children":["Click_Box_47"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6609"}}},{"id":"Click_Box_48","class":"TODO::Senthil","instance":"Click_Box_48","roles":{"click":{"subtype":"button"}}},{"id":"Slide6625","class":"PPTX Slide","instance":"Best Practices – Internet Usage","thumbnail":"","children":["Click_Box_48"],"roles":{"slide":{"durationInFrames":1566},"navigation":{"navid":"Slide6625"}}},{"id":"Click_Box_49","class":"TODO::Senthil","instance":"Click_Box_49","roles":{"click":{"subtype":"button"}}},{"id":"Slide6641","class":"PPTX Slide","instance":"Social Media","thumbnail":"","children":["Click_Box_49"],"roles":{"slide":{"durationInFrames":2016},"navigation":{"navid":"Slide6641"}}},{"id":"Click_Box_50","class":"TODO::Senthil","instance":"Click_Box_50","roles":{"click":{"subtype":"button"}}},{"id":"Slide6657","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":["Click_Box_50"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6657"}}},{"id":"Image_29","class":"TODO::Senthil","instance":"Image_29","roles":{"click":{"subtype":"button","question":"Slide39811q13"},"textData":{}}},{"id":"si39635","class":"TODO::Senthil","instance":"Text_Caption_231","title":"Knowledge Check #5 ","roles":{"textData":{}}},{"id":"si39647","class":"TODO::Senthil","instance":"Text_Caption_232","title":"Employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can lead to data loss or a data breach. ","roles":{"textData":{}}},{"id":"si39658","class":"TODO::Senthil","instance":"Text_Caption_233","title":"a. ","roles":{"textData":{}}},{"id":"si39662","class":"TODO::Senthil","instance":"Text_Caption_234","title":"True ","roles":{"textData":{}}},{"id":"si39658_a","class":"TODO::Senthil","instance":"87","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si39669","class":"TODO::Senthil","instance":"Text_Caption_235","title":"b. ","roles":{"textData":{}}},{"id":"si39673","class":"TODO::Senthil","instance":"Text_Caption_236","title":"False ","roles":{"textData":{}}},{"id":"si39669_a","class":"TODO::Senthil","instance":"89","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si39741","class":"TODO::Senthil","instance":"Button_26","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide39811q13","for":"Slide39811q13"},"textData":{}}},{"id":"si39753","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide39811q13","for":"Slide39811q13"},"textData":{}}},{"id":"si39765","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide39811q13","for":"Slide39811q13"},"textData":{}}},{"id":"si39711","class":"TODO::Senthil","instance":"SmartShape_70","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide39811q13"},"textData":{}}},{"id":"si39784","class":"TODO::Senthil","instance":"SmartShape_71","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide39811q13"},"textData":{}}},{"id":"si39797","class":"TODO::Senthil","instance":"SmartShape_72","title":"Correct Answer: Employee error can lead to data loss or a data breach Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide39811q13"},"textData":{}}},{"id":"Slide39811","class":"Question Slide","instance":"","thumbnail":"","children":["Image_29","si39635","si39647","si39662","si39673","si39741","si39753","si39765","si39711"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide39811"},"question":{"interactionId":"39607","quizId":379,"title":"Knowledge Check #5\r","text":"Employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can lead to data loss or a data breach.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_30","class":"TODO::Senthil","instance":"Image_30","roles":{"click":{"subtype":"button","question":"Slide40029q14"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si39853","class":"TODO::Senthil","instance":"Text_Caption_237","title":"Knowledge Check #5 ","roles":{"textData":{}}},{"id":"si39865","class":"TODO::Senthil","instance":"Text_Caption_238","title":"What key sequence can you use to lock your screen when you step away from your computer? ","roles":{"textData":{}}},{"id":"si39876","class":"TODO::Senthil","instance":"Text_Caption_239","title":"a. ","roles":{"textData":{}}},{"id":"si39880","class":"TODO::Senthil","instance":"Text_Caption_240","title":"CTRL + ALT + DELETE ","roles":{"textData":{}}},{"id":"si39876_a","class":"TODO::Senthil","instance":"92","roles":{"answer":{"title":"CTRL + ALT + DELETE\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si39887","class":"TODO::Senthil","instance":"Text_Caption_241","title":"b. ","roles":{"textData":{}}},{"id":"si39891","class":"TODO::Senthil","instance":"Text_Caption_242","title":"CTRL + ALT + SHIFT ","roles":{"textData":{}}},{"id":"si39887_a","class":"TODO::Senthil","instance":"94","roles":{"answer":{"title":"CTRL + ALT + SHIFT\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si39959","class":"TODO::Senthil","instance":"Button_27","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40029q14","for":"Slide40029q14"},"textData":{}}},{"id":"si39971","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40029q14","for":"Slide40029q14"},"textData":{}}},{"id":"si39983","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40029q14","for":"Slide40029q14"},"textData":{}}},{"id":"si39929","class":"TODO::Senthil","instance":"SmartShape_73","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide40029q14"},"textData":{}}},{"id":"si40002","class":"TODO::Senthil","instance":"SmartShape_74","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide40029q14"},"textData":{}}},{"id":"si40015","class":"TODO::Senthil","instance":"SmartShape_75","title":"Correct Answer: CTRL + ALT + DELETE Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide40029q14"},"textData":{}}},{"id":"Slide40029","class":"Question Slide","instance":"","thumbnail":"","children":["Image_30","si39853","si39865","si39880","si39891","si39959","si39971","si39983","si39929"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide40029"},"question":{"interactionId":"39826","quizId":379,"title":"Knowledge Check #5\r","text":"What key sequence can you use to lock your screen when you step away from your computer?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_31","class":"TODO::Senthil","instance":"Image_31","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"question":{"interactionId":"40062","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si40083","class":"TODO::Senthil","instance":"Text_Caption_243","title":"Knowledge Check #5 ","roles":{"textData":{}}},{"id":"si40095","class":"TODO::Senthil","instance":"Text_Caption_244","title":"Select all the conventions listed below that make for a strong password. ","roles":{"textData":{}}},{"id":"si40106","class":"TODO::Senthil","instance":"Text_Caption_245","title":"a. ","roles":{"textData":{}}},{"id":"si40110","class":"TODO::Senthil","instance":"Text_Caption_246","title":"Your pet’s name ","roles":{"textData":{}}},{"id":"si40110","class":"TODO::Senthil","instance":"96","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si40106_a","class":"TODO::Senthil","instance":"97","roles":{"answer":{"title":"Your pet’s name\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40117","class":"TODO::Senthil","instance":"Text_Caption_247","title":"b. ","roles":{"textData":{}}},{"id":"si40121","class":"TODO::Senthil","instance":"Text_Caption_248","title":"Change common words by substituting letters with numbers and punctuation marks or symbols ","roles":{"textData":{}}},{"id":"si40121","class":"TODO::Senthil","instance":"98","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si40117_a","class":"TODO::Senthil","instance":"99","roles":{"answer":{"title":"Change common words by substituting letters with numbers and punctuation marks or symbols\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40128","class":"TODO::Senthil","instance":"Text_Caption_249","title":"c. ","roles":{"textData":{}}},{"id":"si40132","class":"TODO::Senthil","instance":"Text_Caption_250","title":"Use phonetic replacements ","roles":{"textData":{}}},{"id":"si40132","class":"TODO::Senthil","instance":"100","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si40128_a","class":"TODO::Senthil","instance":"101","roles":{"answer":{"title":"Use phonetic replacements\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40139","class":"TODO::Senthil","instance":"Text_Caption_251","title":"d. ","roles":{"textData":{}}},{"id":"si40143","class":"TODO::Senthil","instance":"Text_Caption_252","title":"Make deliberate but obvious misspellings ","roles":{"textData":{}}},{"id":"si40143","class":"TODO::Senthil","instance":"102","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si40139_a","class":"TODO::Senthil","instance":"103","roles":{"answer":{"title":"Make deliberate but obvious misspellings\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40150","class":"TODO::Senthil","instance":"Text_Caption_253","title":"e. ","roles":{"textData":{}}},{"id":"si40154","class":"TODO::Senthil","instance":"Text_Caption_254","title":"All of the above ","roles":{"textData":{}}},{"id":"si40154","class":"TODO::Senthil","instance":"104","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si40150_a","class":"TODO::Senthil","instance":"105","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40222","class":"TODO::Senthil","instance":"Button_28","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40292q15","for":"Slide40292q15"},"textData":{}}},{"id":"si40234","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40292q15","for":"Slide40292q15"},"textData":{}}},{"id":"si40246","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40292q15","for":"Slide40292q15"},"textData":{}}},{"id":"si40192","class":"TODO::Senthil","instance":"SmartShape_76","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"textData":{}}},{"id":"si40265","class":"TODO::Senthil","instance":"SmartShape_77","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"textData":{}}},{"id":"si40278","class":"TODO::Senthil","instance":"SmartShape_78","title":"Correct Answers: Change common words by substituting letters with numbers or symbols AND Use phonetic replacements AND Make deliberate but obvious misspellings Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide40292q15"},"textData":{}}},{"id":"Slide40292","class":"Question Slide","instance":"","thumbnail":"","children":["Image_31","si40083","si40095","si40110","si40121","si40132","si40143","si40154","si40222","si40234","si40246","si40192"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide40292"},"question":{"interactionId":"40056","quizId":379,"title":"Knowledge Check #5\r","text":"Select all the conventions listed below that make for a strong password. \r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["b","c","d"]}}},{"id":"Image_32","class":"TODO::Senthil","instance":"Image_32","roles":{"click":{"subtype":"button","question":"Slide40540q16"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si40342","class":"TODO::Senthil","instance":"Text_Caption_255","title":"Knowledge Check # 5 ","roles":{"textData":{}}},{"id":"si40354","class":"TODO::Senthil","instance":"Text_Caption_256","title":"Who is responsible for the security of your social media sites? ","roles":{"textData":{}}},{"id":"si40365","class":"TODO::Senthil","instance":"Text_Caption_257","title":"a. ","roles":{"textData":{}}},{"id":"si40369","class":"TODO::Senthil","instance":"Text_Caption_258","title":"Facebook ","roles":{"textData":{}}},{"id":"si40365_a","class":"TODO::Senthil","instance":"55_95","roles":{"answer":{"title":"Facebook\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40376","class":"TODO::Senthil","instance":"Text_Caption_259","title":"b. ","roles":{"textData":{}}},{"id":"si40380","class":"TODO::Senthil","instance":"Text_Caption_260","title":"Twitter ","roles":{"textData":{}}},{"id":"si40376_a","class":"TODO::Senthil","instance":"57_96","roles":{"answer":{"title":"Twitter\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40387","class":"TODO::Senthil","instance":"Text_Caption_261","title":"c. ","roles":{"textData":{}}},{"id":"si40391","class":"TODO::Senthil","instance":"Text_Caption_262","title":"You are ","roles":{"textData":{}}},{"id":"si40387_a","class":"TODO::Senthil","instance":"59_97","roles":{"answer":{"title":"You are\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40398","class":"TODO::Senthil","instance":"Text_Caption_263","title":"d. ","roles":{"textData":{}}},{"id":"si40402","class":"TODO::Senthil","instance":"Text_Caption_264","title":"YouTube ","roles":{"textData":{}}},{"id":"si40398_a","class":"TODO::Senthil","instance":"61_98","roles":{"answer":{"title":"YouTube\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si40470","class":"TODO::Senthil","instance":"Button_29","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40540q16","for":"Slide40540q16"},"textData":{}}},{"id":"si40482","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40540q16","for":"Slide40540q16"},"textData":{}}},{"id":"si40494","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide40540q16","for":"Slide40540q16"},"textData":{}}},{"id":"si40440","class":"TODO::Senthil","instance":"SmartShape_79","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide40540q16"},"textData":{}}},{"id":"si40513","class":"TODO::Senthil","instance":"SmartShape_80","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide40540q16"},"textData":{}}},{"id":"si40526","class":"TODO::Senthil","instance":"SmartShape_81","title":"Correct Answer: You are responsible for the security of your social media sites. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide40540q16"},"textData":{}}},{"id":"Slide40540","class":"Question Slide","instance":"","thumbnail":"","children":["Image_32","si40342","si40354","si40369","si40380","si40391","si40402","si40470","si40482","si40494","si40440"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide40540"},"question":{"interactionId":"40315","quizId":379,"title":"Knowledge Check # 5\r","text":"Who is responsible for the security of your social media sites? \r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["c"]}}},{"id":"Click_Box_51","class":"TODO::Senthil","instance":"Click_Box_51","roles":{"click":{"subtype":"button"}}},{"id":"Slide6673","class":"PPTX Slide","instance":"Email Usage","thumbnail":"","children":["Click_Box_51"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6673"}}},{"id":"Click_Box_52","class":"TODO::Senthil","instance":"Click_Box_52","roles":{"click":{"subtype":"button"}}},{"id":"Slide6689","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_52"],"roles":{"slide":{"durationInFrames":591},"navigation":{"navid":"Slide6689"}}},{"id":"Click_Box_53","class":"TODO::Senthil","instance":"Click_Box_53","roles":{"click":{"subtype":"button"}}},{"id":"Slide6705","class":"PPTX Slide","instance":"Email Usage","thumbnail":"","children":["Click_Box_53"],"roles":{"slide":{"durationInFrames":885},"navigation":{"navid":"Slide6705"}}},{"id":"Click_Box_54","class":"TODO::Senthil","instance":"Click_Box_54","roles":{"click":{"subtype":"button"}}},{"id":"Slide6721","class":"PPTX Slide","instance":"Best Practices - Email","thumbnail":"","children":["Click_Box_54"],"roles":{"slide":{"durationInFrames":762},"navigation":{"navid":"Slide6721"}}},{"id":"Click_Box_55","class":"TODO::Senthil","instance":"Click_Box_55","roles":{"click":{"subtype":"button"}}},{"id":"Slide6737","class":"PPTX Slide","instance":"Best Practices - Email","thumbnail":"","children":["Click_Box_55"],"roles":{"slide":{"durationInFrames":678},"navigation":{"navid":"Slide6737"}}},{"id":"Click_Box_56","class":"TODO::Senthil","instance":"Click_Box_56","roles":{"click":{"subtype":"button"}}},{"id":"Slide6753","class":"PPTX Slide","instance":"Protecting Company & Client Data","thumbnail":"","children":["Click_Box_56"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6753"}}},{"id":"Click_Box_57","class":"TODO::Senthil","instance":"Click_Box_57","roles":{"click":{"subtype":"button"}}},{"id":"Slide6769","class":"PPTX Slide","instance":"Reviewing Your Responsibilities","thumbnail":"","children":["Click_Box_57"],"roles":{"slide":{"durationInFrames":1425},"navigation":{"navid":"Slide6769"}}},{"id":"Click_Box_58","class":"TODO::Senthil","instance":"Click_Box_58","roles":{"click":{"subtype":"button"}}},{"id":"Slide6785","class":"PPTX Slide","instance":"Best Practices – Hard Copies","thumbnail":"","children":["Click_Box_58"],"roles":{"slide":{"durationInFrames":747},"navigation":{"navid":"Slide6785"}}},{"id":"Click_Box_59","class":"TODO::Senthil","instance":"Click_Box_59","roles":{"click":{"subtype":"button"}}},{"id":"Slide6801","class":"PPTX Slide","instance":"Best Practices – Verbal Communication","thumbnail":"","children":["Click_Box_59"],"roles":{"slide":{"durationInFrames":1014},"navigation":{"navid":"Slide6801"}}},{"id":"Click_Box_60","class":"TODO::Senthil","instance":"Click_Box_60","roles":{"click":{"subtype":"button"}}},{"id":"Slide6817","class":"PPTX Slide","instance":"Recognizing Threats","thumbnail":"","children":["Click_Box_60"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6817"}}},{"id":"Click_Box_61","class":"TODO::Senthil","instance":"Click_Box_61","roles":{"click":{"subtype":"button"}}},{"id":"Slide6833","class":"PPTX Slide","instance":"Threats","thumbnail":"","children":["Click_Box_61"],"roles":{"slide":{"durationInFrames":765},"navigation":{"navid":"Slide6833"}}},{"id":"Text_Caption_1","class":"TODO::Senthil","instance":"Text_Caption_1","title":"Types of Threats ","roles":{"textData":{}}},{"id":"Image_1","class":"TODO::Senthil","instance":"Image_1","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"AcctTak1_1","class":"TODO::Senthil","instance":"AcctTak1_1","title":"Account Takeover ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11024","class":"TODO::Senthil","title":"Account Takeover ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11043","class":"TODO::Senthil","title":"Account Takeover ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Bckdr_2","class":"TODO::Senthil","instance":"Bckdr_2","title":"Back door ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11079","class":"TODO::Senthil","title":"Back door ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11092","class":"TODO::Senthil","title":"Back door ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DtaExfl_3","class":"TODO::Senthil","instance":"DtaExfl_3","title":"Data Ex-filtration ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11128","class":"TODO::Senthil","title":"Data Ex-filtration ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11141","class":"TODO::Senthil","title":"Data Ex-filtration ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DoS_4","class":"TODO::Senthil","instance":"DoS_4","title":"Denial of Service (DoS) Attack ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11177","class":"TODO::Senthil","title":"Denial of Service (DoS) Attack ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11190","class":"TODO::Senthil","title":"Denial of Service (DoS) Attack ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Eaves_5","class":"TODO::Senthil","instance":"Eaves_5","title":"Eavesdropping ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11226","class":"TODO::Senthil","title":"Eavesdropping ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11239","class":"TODO::Senthil","title":"Eavesdropping ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"InsdrThrt_6","class":"TODO::Senthil","instance":"InsdrThrt_6","title":"Insider Threat ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11275","class":"TODO::Senthil","title":"Insider Threat ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11288","class":"TODO::Senthil","title":"Insider Threat ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Eaves_7","class":"TODO::Senthil","instance":"Eaves_7","title":"The act of secretly listening to a private conversation between systems on a network. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DoS_8","class":"TODO::Senthil","instance":"DoS_8","title":"An attack that seeks to make a network or system unavailable to its intended users by disrupting its services. Example: flooding the targeted system with excessive illegitimate requests that overloads the system, preventing legitimate requests from being fulfilled. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"InsdrThrt_9","class":"TODO::Senthil","instance":"InsdrThrt_9","title":"A malicious threat to an organization that comes from people within the organization with inside information about the organization's security practices, computer systems, or information; for example, the theft of confidential or commercially valuable information. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"DtaExfl_10","class":"TODO::Senthil","instance":"DtaExfl_10","title":"The unauthorized transfer of data from a computer. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Bckdr2_11","class":"TODO::Senthil","instance":"Bckdr2_11","title":"A secret method of bypassing the normal authentication or security controls; for example, use of a default password that has not been changed. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"AcctTak2_12","class":"TODO::Senthil","instance":"AcctTak2_12","title":"A form of identity theft in which the attacker obtains access to a user's account, typically via a back door, malware, or phishing, and then makes unauthorized transactions. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Button_1","class":"TODO::Senthil","instance":"Button_1","roles":{"click":{"subtype":"button"}}},{"id":"si11434","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"si11447","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"Slide11467","class":"Normal Slide","instance":"Types of Threats 1","thumbnail":"","children":["Text_Caption_1","Image_1","AcctTak1_1","si11024","si11043","Bckdr_2","si11079","si11092","DtaExfl_3","si11128","si11141","DoS_4","si11177","si11190","Eaves_5","si11226","si11239","InsdrThrt_6","si11275","si11288","Eaves_7","DoS_8","InsdrThrt_9","DtaExfl_10","Bckdr2_11","AcctTak2_12","Button_1","si11434","si11447"],"roles":{"slide":{"durationInFrames":18000},"navigation":{"navid":"Slide11467"}}},{"id":"Text_Caption_2","class":"TODO::Senthil","instance":"Text_Caption_2","title":"Types of Threats ","roles":{"textData":{}}},{"id":"Image_2","class":"TODO::Senthil","instance":"Image_2","roles":{"click":{"subtype":"button"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"Phsh_13","class":"TODO::Senthil","instance":"Phsh_13","title":"Phishing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11538","class":"TODO::Senthil","title":"Phishing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11557","class":"TODO::Senthil","title":"Phishing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Priv_14","class":"TODO::Senthil","instance":"Priv_14","title":"Privilege Escalation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11593","class":"TODO::Senthil","title":"Privilege Escalation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11606","class":"TODO::Senthil","title":"Privilege Escalation ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Ransm_15","class":"TODO::Senthil","instance":"Ransm_15","title":"Ransomware ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11642","class":"TODO::Senthil","title":"Ransomware ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11655","class":"TODO::Senthil","title":"Ransomware ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"ScEng_16","class":"TODO::Senthil","instance":"ScEng_16","title":"Social Engineering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11691","class":"TODO::Senthil","title":"Social Engineering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11704","class":"TODO::Senthil","title":"Social Engineering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Spf_17","class":"TODO::Senthil","instance":"Spf_17","title":"Spoofing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11740","class":"TODO::Senthil","title":"Spoofing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11753","class":"TODO::Senthil","title":"Spoofing ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"InsdrThrt_18","class":"TODO::Senthil","instance":"InsdrThrt_18","title":"Tampering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11789","class":"TODO::Senthil","title":"Tampering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si11802","class":"TODO::Senthil","title":"Tampering ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Spf_19","class":"TODO::Senthil","instance":"Spf_19","title":"A situation in which a person or program successfully masquerades as another by falsifying data; for example, the creation of an email message with a forged sender address. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"ScEng_20","class":"TODO::Senthil","instance":"ScEng_20","title":"The psychological manipulation of people into performing actions or divulging sensitive information; for example, the impersonation of a trusted contractor or customer. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Tmpg_21","class":"TODO::Senthil","instance":"Tmpg_21","title":"A malicious modification of software or information. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Ransm_22","class":"TODO::Senthil","instance":"Ransm_22","title":"A type of malicious software that blocks access to the victim's data or threatens to publish or delete it until a ransom is paid. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Priv_23","class":"TODO::Senthil","instance":"Priv_23","title":"A situation where a user with a level of privilege or access is able to increase his or her level of privilege or access; for example, a user fools the system into giving him or her access to restricted data. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Phsh_24","class":"TODO::Senthil","instance":"Phsh_24","title":"An attempt to obtain sensitive information by disguising as a trustworthy source in an electronic communication; for example, an email directing a user to enter details at an illegitimate website that looks and functions in an identical manner to the legitimate site. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Button_2","class":"TODO::Senthil","instance":"Button_2","roles":{"click":{"subtype":"button"}}},{"id":"si11954","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"si11967","class":"TODO::Senthil","roles":{"click":{"subtype":"button"}}},{"id":"Slide11987","class":"Normal Slide","instance":"Types of Threats 2","thumbnail":"","children":["Text_Caption_2","Image_2","Phsh_13","si11538","si11557","Priv_14","si11593","si11606","Ransm_15","si11642","si11655","ScEng_16","si11691","si11704","Spf_17","si11740","si11753","InsdrThrt_18","si11789","si11802","Spf_19","ScEng_20","Tmpg_21","Ransm_22","Priv_23","Phsh_24","Button_2","si11954","si11967"],"roles":{"slide":{"durationInFrames":18000},"navigation":{"navid":"Slide11987"}}},{"id":"Click_Box_63","class":"TODO::Senthil","instance":"Click_Box_63","roles":{"click":{"subtype":"button"}}},{"id":"Image_4","class":"TODO::Senthil","instance":"Image_4","roles":{"click":{"subtype":"button"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"Slide6865","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_63","Image_4"],"roles":{"slide":{"durationInFrames":846},"navigation":{"navid":"Slide6865"}}},{"id":"Click_Box_64","class":"TODO::Senthil","instance":"Click_Box_64","roles":{"click":{"subtype":"button"}}},{"id":"Image_5","class":"TODO::Senthil","instance":"Image_5","roles":{"click":{"subtype":"button"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"Slide6881","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_64","Image_5"],"roles":{"slide":{"durationInFrames":963},"navigation":{"navid":"Slide6881"}}},{"id":"Click_Box_65","class":"TODO::Senthil","instance":"Click_Box_65","roles":{"click":{"subtype":"button"}}},{"id":"Slide6897","class":"PPTX Slide","instance":"Phishing Attacks","thumbnail":"","children":["Click_Box_65"],"roles":{"slide":{"durationInFrames":1185},"navigation":{"navid":"Slide6897"}}},{"id":"Click_Box_66","class":"TODO::Senthil","instance":"Click_Box_66","roles":{"click":{"subtype":"button"}}},{"id":"Slide6913","class":"PPTX Slide","instance":"","thumbnail":"","children":["Click_Box_66"],"roles":{"slide":{"durationInFrames":1842},"navigation":{"navid":"Slide6913"}}},{"id":"Click_Box_67","class":"TODO::Senthil","instance":"Click_Box_67","roles":{"click":{"subtype":"button"}}},{"id":"Slide6929","class":"PPTX Slide","instance":"Phishing Examples","thumbnail":"","children":["Click_Box_67"],"roles":{"slide":{"durationInFrames":1041},"navigation":{"navid":"Slide6929"}}},{"id":"Click_Box_68","class":"TODO::Senthil","instance":"Click_Box_68","roles":{"click":{"subtype":"button"}}},{"id":"Slide6945","class":"PPTX Slide","instance":"Symptoms of Cybersecurity Events","thumbnail":"","children":["Click_Box_68"],"roles":{"slide":{"durationInFrames":1236},"navigation":{"navid":"Slide6945"}}},{"id":"Click_Box_69","class":"TODO::Senthil","instance":"Click_Box_69","roles":{"click":{"subtype":"button"}}},{"id":"Slide6961","class":"PPTX Slide","instance":"Reporting Threats","thumbnail":"","children":["Click_Box_69"],"roles":{"slide":{"durationInFrames":1242},"navigation":{"navid":"Slide6961"}}},{"id":"Click_Box_70","class":"TODO::Senthil","instance":"Click_Box_70","roles":{"click":{"subtype":"button"}}},{"id":"Slide6977","class":"PPTX Slide","instance":"New Threats","thumbnail":"","children":["Click_Box_70"],"roles":{"slide":{"durationInFrames":714},"navigation":{"navid":"Slide6977"}}},{"id":"Click_Box_71","class":"TODO::Senthil","instance":"Click_Box_71","roles":{"click":{"subtype":"button"}}},{"id":"Slide6993","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":["Click_Box_71"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6993"}}},{"id":"Image_33","class":"TODO::Senthil","instance":"Image_33","roles":{"click":{"subtype":"button","question":"Slide43742q17"},"textData":{}}},{"id":"si43555","class":"TODO::Senthil","instance":"Text_Caption_265","title":"Knowledge Check # 4 ","roles":{"textData":{}}},{"id":"si43567","class":"TODO::Senthil","instance":"Text_Caption_266","title":"You are visiting a website (for business purposes, of course) and a suspicious pop-up window appears. What should you do? ","roles":{"textData":{}}},{"id":"si43578","class":"TODO::Senthil","instance":"Text_Caption_267","title":"a. ","roles":{"textData":{}}},{"id":"si43582","class":"TODO::Senthil","instance":"Text_Caption_268","title":"Click Cancel ","roles":{"textData":{}}},{"id":"si43578_a","class":"TODO::Senthil","instance":"107","roles":{"answer":{"title":"Click Cancel\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43589","class":"TODO::Senthil","instance":"Text_Caption_269","title":"b. ","roles":{"textData":{}}},{"id":"si43593","class":"TODO::Senthil","instance":"Text_Caption_270","title":"Click OK ","roles":{"textData":{}}},{"id":"si43589_a","class":"TODO::Senthil","instance":"109","roles":{"answer":{"title":"Click OK\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43600","class":"TODO::Senthil","instance":"Text_Caption_271","title":"c. ","roles":{"textData":{}}},{"id":"si43604","class":"TODO::Senthil","instance":"Text_Caption_272","title":"Click the close button (X) ","roles":{"textData":{}}},{"id":"si43600_a","class":"TODO::Senthil","instance":"111","roles":{"answer":{"title":"Click the close button (X)\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43672","class":"TODO::Senthil","instance":"Button_30","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide43742q17","for":"Slide43742q17"},"textData":{}}},{"id":"si43684","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide43742q17","for":"Slide43742q17"},"textData":{}}},{"id":"si43696","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide43742q17","for":"Slide43742q17"},"textData":{}}},{"id":"si43642","class":"TODO::Senthil","instance":"SmartShape_82","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide43742q17"},"textData":{}}},{"id":"si43715","class":"TODO::Senthil","instance":"SmartShape_83","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide43742q17"},"textData":{}}},{"id":"si43728","class":"TODO::Senthil","instance":"SmartShape_84","title":"Correct Answer: Click the close button (X) Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide43742q17"},"textData":{}}},{"id":"Slide43742","class":"Question Slide","instance":"","thumbnail":"","children":["Image_33","si43555","si43567","si43582","si43593","si43604","si43672","si43684","si43696","si43642"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide43742"},"question":{"interactionId":"43528","quizId":379,"title":"Knowledge Check # 4\r","text":"You are visiting a website (for business purposes, of course) and a suspicious pop-up window appears. What should you do?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["c"]}}},{"id":"Image_34","class":"TODO::Senthil","instance":"Image_34","roles":{"click":{"subtype":"button","question":"Slide43990q18"},"question":{"interactionId":"43771","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si43792","class":"TODO::Senthil","instance":"Text_Caption_273","title":"Knowledge Check # 4 ","roles":{"textData":{}}},{"id":"si43804","class":"TODO::Senthil","instance":"Text_Caption_274","title":"Before you open an email message, respond to requests to click on links, or download attachments what can you do to confirm that the message is safe? ","roles":{"textData":{}}},{"id":"si43815","class":"TODO::Senthil","instance":"Text_Caption_275","title":"a. ","roles":{"textData":{}}},{"id":"si43819","class":"TODO::Senthil","instance":"Text_Caption_276","title":"The message comes from someone you know or who has sent you an email in the past. ","roles":{"textData":{}}},{"id":"si43815_a","class":"TODO::Senthil","instance":"114","roles":{"answer":{"title":"The message comes from someone you know or who has sent you an email in the past.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43826","class":"TODO::Senthil","instance":"Text_Caption_277","title":"b. ","roles":{"textData":{}}},{"id":"si43830","class":"TODO::Senthil","instance":"Text_Caption_278","title":"The message is something you were expecting. ","roles":{"textData":{}}},{"id":"si43826_a","class":"TODO::Senthil","instance":"116","roles":{"answer":{"title":"The message is something you were expecting.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43837","class":"TODO::Senthil","instance":"Text_Caption_279","title":"c. ","roles":{"textData":{}}},{"id":"si43841","class":"TODO::Senthil","instance":"Text_Caption_280","title":"The message does not look out of the ordinary with incorrect spelling or unusual characters. ","roles":{"textData":{}}},{"id":"si43837_a","class":"TODO::Senthil","instance":"118","roles":{"answer":{"title":"The message does not look out of the ordinary with incorrect spelling or unusual characters.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43848","class":"TODO::Senthil","instance":"Text_Caption_281","title":"d. ","roles":{"textData":{}}},{"id":"si43852","class":"TODO::Senthil","instance":"Text_Caption_282","title":"All of the above ","roles":{"textData":{}}},{"id":"si43848_a","class":"TODO::Senthil","instance":"120","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si43920","class":"TODO::Senthil","instance":"Button_31","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide43990q18","for":"Slide43990q18"},"textData":{}}},{"id":"si43932","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide43990q18","for":"Slide43990q18"},"textData":{}}},{"id":"si43944","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide43990q18","for":"Slide43990q18"},"textData":{}}},{"id":"si43890","class":"TODO::Senthil","instance":"SmartShape_85","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide43990q18"},"textData":{}}},{"id":"si43963","class":"TODO::Senthil","instance":"SmartShape_86","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide43990q18"},"textData":{}}},{"id":"si43976","class":"TODO::Senthil","instance":"SmartShape_87","title":"Correct Answer: All the above - We should ensure the message is from a known sender or is expected. We should also check that the message is legitimate and not full of gramatical errors. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide43990q18"},"textData":{}}},{"id":"Slide43990","class":"Question Slide","instance":"","thumbnail":"","children":["Image_34","si43792","si43804","si43819","si43830","si43841","si43852","si43920","si43932","si43944","si43890"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide43990"},"question":{"interactionId":"43765","quizId":379,"title":"Knowledge Check # 4\r","text":"Before you open an email message, respond to requests to click on links, or download attachments what can you do to confirm that the message is safe?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["d"]}}},{"id":"Image_35","class":"TODO::Senthil","instance":"Image_35","roles":{"click":{"subtype":"button","question":"Slide44238q19"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si44040","class":"TODO::Senthil","instance":"Text_Caption_283","title":"Knowledge Check # 4 ","roles":{"textData":{}}},{"id":"si44052","class":"TODO::Senthil","instance":"Text_Caption_284","title":"If you experience any unsual problems with your computer, you should report it to ____. ","roles":{"textData":{}}},{"id":"si44063","class":"TODO::Senthil","instance":"Text_Caption_285","title":"a. ","roles":{"textData":{}}},{"id":"si44067","class":"TODO::Senthil","instance":"Text_Caption_286","title":"Help Desk ","roles":{"textData":{}}},{"id":"si44063_a","class":"TODO::Senthil","instance":"37_121","roles":{"answer":{"title":"Help Desk\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si44074","class":"TODO::Senthil","instance":"Text_Caption_287","title":"b. ","roles":{"textData":{}}},{"id":"si44078","class":"TODO::Senthil","instance":"Text_Caption_288","title":"Your mother ","roles":{"textData":{}}},{"id":"si44074_a","class":"TODO::Senthil","instance":"39_122","roles":{"answer":{"title":"Your mother\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si44085","class":"TODO::Senthil","instance":"Text_Caption_289","title":"c. ","roles":{"textData":{}}},{"id":"si44089","class":"TODO::Senthil","instance":"Text_Caption_290","title":"Your colleagues ","roles":{"textData":{}}},{"id":"si44085_a","class":"TODO::Senthil","instance":"41_123","roles":{"answer":{"title":"Your colleagues\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si44096","class":"TODO::Senthil","instance":"Text_Caption_291","title":"d. ","roles":{"textData":{}}},{"id":"si44100","class":"TODO::Senthil","instance":"Text_Caption_292","title":"A teammate ","roles":{"textData":{}}},{"id":"si44096_a","class":"TODO::Senthil","instance":"43_124","roles":{"answer":{"title":"A teammate\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si44168","class":"TODO::Senthil","instance":"Button_32","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide44238q19","for":"Slide44238q19"},"textData":{}}},{"id":"si44180","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide44238q19","for":"Slide44238q19"},"textData":{}}},{"id":"si44192","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide44238q19","for":"Slide44238q19"},"textData":{}}},{"id":"si44138","class":"TODO::Senthil","instance":"SmartShape_88","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide44238q19"},"textData":{}}},{"id":"si44211","class":"TODO::Senthil","instance":"SmartShape_89","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide44238q19"},"textData":{}}},{"id":"si44224","class":"TODO::Senthil","instance":"SmartShape_90","title":"Correct Answer: Unusual computer problems should be reported to Help Desk. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide44238q19"},"textData":{}}},{"id":"Slide44238","class":"Question Slide","instance":"","thumbnail":"","children":["Image_35","si44040","si44052","si44067","si44078","si44089","si44100","si44168","si44180","si44192","si44138"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide44238"},"question":{"interactionId":"44013","quizId":379,"title":"Knowledge Check # 4\r","text":"If you experience any unsual problems with your computer, you should report it to ____.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["a"]}}},{"id":"Image_10","class":"TODO::Senthil","instance":"Image_10","roles":{"click":{"subtype":"button","question":"Slide20230q20"},"textData":{}}},{"id":"si20054","class":"TODO::Senthil","instance":"Text_Caption_53","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si20066","class":"TODO::Senthil","instance":"Text_Caption_54","title":"True or False: Eavesdropping is the act of secretly listening to a private conversation between systems on a network. ","roles":{"textData":{}}},{"id":"si20077","class":"TODO::Senthil","instance":"Text_Caption_55","title":" ","roles":{"textData":{}}},{"id":"si20081","class":"TODO::Senthil","instance":"Text_Caption_56","title":"True ","roles":{"textData":{}}},{"id":"si20077_a","class":"TODO::Senthil","instance":"39_12","roles":{"answer":{"title":"True\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20088","class":"TODO::Senthil","instance":"Text_Caption_57","title":" ","roles":{"textData":{}}},{"id":"si20092","class":"TODO::Senthil","instance":"Text_Caption_58","title":"False ","roles":{"textData":{}}},{"id":"si20088_a","class":"TODO::Senthil","instance":"41_13","roles":{"answer":{"title":"False\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20160","class":"TODO::Senthil","instance":"Button_7","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20230q20","for":"Slide20230q20"},"textData":{}}},{"id":"si20172","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20230q20","for":"Slide20230q20"},"textData":{}}},{"id":"si20184","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20230q20","for":"Slide20230q20"},"textData":{}}},{"id":"si20130","class":"TODO::Senthil","instance":"SmartShape_13","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide20230q20"},"textData":{}}},{"id":"si20203","class":"TODO::Senthil","instance":"SmartShape_14","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide20230q20"},"textData":{}}},{"id":"si20216","class":"TODO::Senthil","instance":"SmartShape_15","title":"Correct Answer: True, eavesdropping is secretly listening to a private conversation between systems on a network. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide20230q20"},"textData":{}}},{"id":"Slide20230","class":"Question Slide","instance":"","thumbnail":"","children":["Image_10","si20054","si20066","si20081","si20092","si20160","si20172","si20184","si20130"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide20230"},"question":{"interactionId":"20027","quizId":379,"title":"Knowledge Check #3\r","text":"True or False: Eavesdropping is the act of secretly listening to a private conversation between systems on a network.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_11","class":"TODO::Senthil","instance":"Image_11","roles":{"click":{"subtype":"button","question":"Slide20448q21"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si20272","class":"TODO::Senthil","instance":"Text_Caption_59","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si20284","class":"TODO::Senthil","instance":"Text_Caption_60","title":"True/False: Back door is a term that refers to a secret meeting of thieves behind the building. ","roles":{"textData":{}}},{"id":"si20295","class":"TODO::Senthil","instance":"Text_Caption_61","title":" ","roles":{"textData":{}}},{"id":"si20299","class":"TODO::Senthil","instance":"Text_Caption_62","title":"True ","roles":{"textData":{}}},{"id":"si20295_a","class":"TODO::Senthil","instance":"44_14","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si20306","class":"TODO::Senthil","instance":"Text_Caption_63","title":" ","roles":{"textData":{}}},{"id":"si20310","class":"TODO::Senthil","instance":"Text_Caption_64","title":"False ","roles":{"textData":{}}},{"id":"si20306_a","class":"TODO::Senthil","instance":"46_15","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si20378","class":"TODO::Senthil","instance":"Button_8","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20448q21","for":"Slide20448q21"},"textData":{}}},{"id":"si20390","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20448q21","for":"Slide20448q21"},"textData":{}}},{"id":"si20402","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20448q21","for":"Slide20448q21"},"textData":{}}},{"id":"si20348","class":"TODO::Senthil","instance":"SmartShape_16","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide20448q21"},"textData":{}}},{"id":"si20421","class":"TODO::Senthil","instance":"SmartShape_17","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide20448q21"},"textData":{}}},{"id":"si20434","class":"TODO::Senthil","instance":"SmartShape_18","title":"Correct Answer: False, A back door is a A secret method of bypassing the normal authentication or security controls; for example, use of a default password that has not been changed. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide20448q21"},"textData":{}}},{"id":"Slide20448","class":"Question Slide","instance":"","thumbnail":"","children":["Image_11","si20272","si20284","si20299","si20310","si20378","si20390","si20402","si20348"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide20448"},"question":{"interactionId":"20245","quizId":379,"title":"Knowledge Check #3\r","text":"True/False: Backdoor is a term that refers to a secret meeting of thieves behind the building.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["2"]}}},{"id":"Image_12","class":"TODO::Senthil","instance":"Image_12","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"textData":{}}},{"id":"si20514","class":"TODO::Senthil","instance":"Text_Caption_65","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si20526","class":"TODO::Senthil","instance":"Text_Caption_66","title":"Select four (4) types of cybersecurity threats to our information systems. ","roles":{"textData":{}}},{"id":"si20537","class":"TODO::Senthil","instance":"Text_Caption_67","title":" ","roles":{"textData":{}}},{"id":"si20541","class":"TODO::Senthil","instance":"Text_Caption_68","title":"Tampering ","roles":{"textData":{}}},{"id":"si20541","class":"TODO::Senthil","instance":"48_1","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20537_a","class":"TODO::Senthil","instance":"49_1","roles":{"answer":{"title":"Tampering\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20548","class":"TODO::Senthil","instance":"Text_Caption_69","title":" ","roles":{"textData":{}}},{"id":"si20552","class":"TODO::Senthil","instance":"Text_Caption_70","title":"Electricity failure ","roles":{"textData":{}}},{"id":"si20552","class":"TODO::Senthil","instance":"50_2","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20548_a","class":"TODO::Senthil","instance":"51_2","roles":{"answer":{"title":"Electricity failure\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20559","class":"TODO::Senthil","instance":"Text_Caption_71","title":" ","roles":{"textData":{}}},{"id":"si20563","class":"TODO::Senthil","instance":"Text_Caption_72","title":"Spoofing ","roles":{"textData":{}}},{"id":"si20563","class":"TODO::Senthil","instance":"52_3","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20559_a","class":"TODO::Senthil","instance":"53_3","roles":{"answer":{"title":"Spoofing\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20570","class":"TODO::Senthil","instance":"Text_Caption_73","title":" ","roles":{"textData":{}}},{"id":"si20574","class":"TODO::Senthil","instance":"Text_Caption_74","title":"VPN ware ","roles":{"textData":{}}},{"id":"si20574","class":"TODO::Senthil","instance":"54_4","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20570_a","class":"TODO::Senthil","instance":"55_4","roles":{"answer":{"title":"VPN ware\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20581","class":"TODO::Senthil","instance":"Text_Caption_75","title":" ","roles":{"textData":{}}},{"id":"si20585","class":"TODO::Senthil","instance":"Text_Caption_76","title":"Ransomware ","roles":{"textData":{}}},{"id":"si20585","class":"TODO::Senthil","instance":"56_5","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20581_a","class":"TODO::Senthil","instance":"57_5","roles":{"answer":{"title":"Ransomware\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20592","class":"TODO::Senthil","instance":"Text_Caption_77","title":" ","roles":{"textData":{}}},{"id":"si20596","class":"TODO::Senthil","instance":"Text_Caption_78","title":"Malfunction of a server with data ","roles":{"textData":{}}},{"id":"si20596","class":"TODO::Senthil","instance":"58_6","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20592_a","class":"TODO::Senthil","instance":"59_6","roles":{"answer":{"title":"Malfunction of a server with data\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20603","class":"TODO::Senthil","instance":"Text_Caption_79","title":" ","roles":{"textData":{}}},{"id":"si20607","class":"TODO::Senthil","instance":"Text_Caption_80","title":"DoS attack ","roles":{"textData":{}}},{"id":"si20607","class":"TODO::Senthil","instance":"60_7","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20603_a","class":"TODO::Senthil","instance":"61_7","roles":{"answer":{"title":"DoS attack\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20614","class":"TODO::Senthil","instance":"Text_Caption_81","title":" ","roles":{"textData":{}}},{"id":"si20618","class":"TODO::Senthil","instance":"Text_Caption_82","title":"All of the above ","roles":{"textData":{}}},{"id":"si20618","class":"TODO::Senthil","instance":"62_8","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si20614_a","class":"TODO::Senthil","instance":"63_8","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si20686","class":"TODO::Senthil","instance":"Button_9","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20756q22","for":"Slide20756q22"},"textData":{}}},{"id":"si20698","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20756q22","for":"Slide20756q22"},"textData":{}}},{"id":"si20710","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide20756q22","for":"Slide20756q22"},"textData":{}}},{"id":"si20656","class":"TODO::Senthil","instance":"SmartShape_19","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"textData":{}}},{"id":"si20729","class":"TODO::Senthil","instance":"SmartShape_20","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"textData":{}}},{"id":"si20742","class":"TODO::Senthil","instance":"SmartShape_21","title":"Correct Answer: Tampering, Spoofing, Ransomware, and DoS Attacks are all types of cybersecurity threats. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide20756q22"},"textData":{}}},{"id":"Slide20756","class":"Question Slide","instance":"","thumbnail":"","children":["Image_12","si20514","si20526","si20541","si20552","si20563","si20574","si20585","si20596","si20607","si20618","si20686","si20698","si20710","si20656"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide20756"},"question":{"interactionId":"20487","quizId":379,"title":"Knowledge Check #3\r","text":"Select four (4) types of cybersecurity threats to our information systems.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["1","3","5","7"]}}},{"id":"Click_Box_72","class":"TODO::Senthil","instance":"Click_Box_72","roles":{"click":{"subtype":"button"}}},{"id":"Slide7009","class":"PPTX Slide","instance":"End of Part 2","thumbnail":"","children":["Click_Box_72"],"roles":{"slide":{"durationInFrames":252},"navigation":{"navid":"Slide7009"}}},{"id":"Pool423","class":"pool","roles":{"pool":{"id":423,"name":"Pool1","questions":[]}}},{"id":"CyberSecurityDraft_Blue_Agentj","class":"project","title":"CyberSecurityDraft_Blue_Agentj","children":["Slide5873","Slide5889","Slide5905","Slide5921","Slide5937","Slide5953","Slide5969","Slide5985","Slide6017","Slide16954","Slide16095","Slide16344","Slide16923","Slide6033","Slide6049","Slide6065","Slide6081","Slide6097","Slide6113","Slide6305","Slide48621","Slide48839","Slide49072","Slide6129","Slide6145","Slide6161","Slide6177","Slide6193","Slide6209","Slide6225","Slide6241","Slide6257","Slide6273","Slide6289","Slide44487","Slide28602","Slide32270","Slide28850","Slide24408","Slide6321","Slide6337","Slide6353","Slide6369","Slide6385","Slide6401","Slide6417","Slide6433","Slide6449","Slide32488","Slide49290","Slide32706","Slide6465","Slide6481","Slide6497","Slide6513","Slide6529","Slide6545","Slide6561","Slide6577","Slide6593","Slide6609","Slide6625","Slide6641","Slide6657","Slide39811","Slide40029","Slide40292","Slide40540","Slide6673","Slide6689","Slide6705","Slide6721","Slide6737","Slide6753","Slide6769","Slide6785","Slide6801","Slide6817","Slide6833","Slide11467","Slide11987","Slide6865","Slide6881","Slide6897","Slide6913","Slide6929","Slide6945","Slide6961","Slide6977","Slide6993","Slide43742","Slide43990","Slide44238","Slide20230","Slide20448","Slide20756","Slide7009"],"roles":{"quiz":{"id":379,"branched":false,"submitAll":false,"review":true,"questions":["Slide16095q0","Slide16344q1","Slide16923q2","Slide48621q3","Slide48839q4","Slide49072q5","Slide28602q6","Slide32270q7","Slide28850q8","Slide24408q9","Slide32488q10","Slide49290q11","Slide32706q12","Slide39811q13","Slide40029q14","Slide40292q15","Slide40540q16","Slide43742q17","Slide43990q18","Slide44238q19","Slide20230q20","Slide20448q21","Slide20756q22"],"minScore":0,"maxScore":0,"passScore":0}}}],"contentSettings":{"global":{"branchAware":false},"toc":{"enabled":false},"playbar":{"enabled":true,"cc":false,"playPause":true,"back":true,"forward":true,"rewind":true,"close":true,"mute":true,"progressBar":true}},"contentReporting":{"CCCriteria":"view","CCData":{"viewDataIsPercent":true,"viewData":100},"SCCriteria":"view","SCData":{"viewDataIsPercent":true,"viewData":100},"exitNormalIfCompleted":false},"toc":[{"id":"Slide5873","title":"Cybersecurity"},{"id":"Slide5889","title":"About the Course"},{"id":"Slide5905","title":"About the Course"},{"id":"Slide5921","title":"Course Assessment"},{"id":"Slide5937","title":"Sign Off"},{"id":"Slide5953","title":"Cybersecurity"},{"id":"Slide5969","title":"Welcome"},{"id":"Slide5985","title":"Cybersecurity Awareness"},{"id":"Slide6017","title":"Purpose"},{"id":"Slide16954","title":"Self-Check"},{"id":"Slide16095","title":"Slide 11"},{"id":"Slide16344","title":"Slide 12"},{"id":"Slide16923","title":"Slide 13"},{"id":"Slide6033","title":"Slide 14"},{"id":"Slide6049","title":"Access Controls"},{"id":"Slide6065","title":"Security Controls"},{"id":"Slide6081","title":"What is meant by network and system security?"},{"id":"Slide6097","title":"Network and System Security"},{"id":"Slide6113","title":"Network and System Security"},{"id":"Slide6305","title":"Self-Check"},{"id":"Slide48621","title":"Slide 21"},{"id":"Slide48839","title":"Slide 22"},{"id":"Slide49072","title":"Slide 23"},{"id":"Slide6129","title":"What is Nonpublic Information?"},{"id":"Slide6145","title":"Business-related information that the unauthorized access to, disclosure of, or use would cause an adverse material impact to our business, operations, or security."},{"id":"Slide6161","title":"Slide 26"},{"id":"Slide6177","title":"Personal identification information which can be used to identify an individual."},{"id":"Slide6193","title":"Slide 28"},{"id":"Slide6209","title":"Protected health information (PHI), in any form or medium created by or derived from a health care provider or an individual and that relates to the past, present, or future health or condition of an individual or their family, provision of health care, or payment for provision of healthcare."},{"id":"Slide6225","title":"Slide 30"},{"id":"Slide6241","title":"Who Has Access?"},{"id":"Slide6257","title":"Slide 32"},{"id":"Slide6273","title":"User Responsibilities"},{"id":"Slide6289","title":"Former Employees"},{"id":"Slide44487","title":"Self-Check"},{"id":"Slide28602","title":"Slide 36"},{"id":"Slide32270","title":"Slide 37"},{"id":"Slide28850","title":"Slide 38"},{"id":"Slide24408","title":"Slide 39"},{"id":"Slide6321","title":"Data Control & Access"},{"id":"Slide6337","title":"Data Control and Access"},{"id":"Slide6353","title":"Internal Control and Access"},{"id":"Slide6369","title":"Internal Control and Access"},{"id":"Slide6385","title":"Slide 44"},{"id":"Slide6401","title":"Internal Control and Access"},{"id":"Slide6417","title":"Slide 46"},{"id":"Slide6433","title":"Disaster Recovery & Business Continuity"},{"id":"Slide6449","title":"Self-Check"},{"id":"Slide32488","title":"Slide 49"},{"id":"Slide49290","title":"Slide 50"},{"id":"Slide32706","title":"Slide 51"},{"id":"Slide6465","title":"Learner Activity"},{"id":"Slide6481","title":"Employee Responsibilities & Best Practices"},{"id":"Slide6497","title":"Never underestimate your importance to cybersecurity."},{"id":"Slide6513","title":"Slide 55"},{"id":"Slide6529","title":"Best Practices - Passwords"},{"id":"Slide6545","title":"Best Practices - Passwords"},{"id":"Slide6561","title":"Password Hints"},{"id":"Slide6577","title":"Password Security"},{"id":"Slide6593","title":"Personal Owned Devices Policy"},{"id":"Slide6609","title":"Internet Usage"},{"id":"Slide6625","title":"Best Practices – Internet Usage"},{"id":"Slide6641","title":"Social Media"},{"id":"Slide6657","title":"Self-Check"},{"id":"Slide39811","title":"Slide 65"},{"id":"Slide40029","title":"Slide 66"},{"id":"Slide40292","title":"Slide 67"},{"id":"Slide40540","title":"Slide 68"},{"id":"Slide6673","title":"Email Usage"},{"id":"Slide6689","title":"Slide 70"},{"id":"Slide6705","title":"Email Usage"},{"id":"Slide6721","title":"Best Practices - Email"},{"id":"Slide6737","title":"Best Practices - Email"},{"id":"Slide6753","title":"Protecting Company & Client Data"},{"id":"Slide6769","title":"Reviewing Your Responsibilities"},{"id":"Slide6785","title":"Best Practices – Hard Copies"},{"id":"Slide6801","title":"Best Practices – Verbal Communication"},{"id":"Slide6817","title":"Recognizing Threats"},{"id":"Slide6833","title":"Threats"},{"id":"Slide11467","title":"Types of Threats 1"},{"id":"Slide11987","title":"Types of Threats 2"},{"id":"Slide6865","title":"Slide 82"},{"id":"Slide6881","title":"Slide 83"},{"id":"Slide6897","title":"Phishing Attacks"},{"id":"Slide6913","title":"Slide 85"},{"id":"Slide6929","title":"Phishing Examples"},{"id":"Slide6945","title":"Symptoms of Cybersecurity Events"},{"id":"Slide6961","title":"Reporting Threats"},{"id":"Slide6977","title":"New Threats"},{"id":"Slide6993","title":"Self-Check"},{"id":"Slide43742","title":"Slide 91"},{"id":"Slide43990","title":"Slide 92"},{"id":"Slide44238","title":"Slide 93"},{"id":"Slide20230","title":"Slide 94"},{"id":"Slide20448","title":"Slide 95"},{"id":"Slide20756","title":"Slide 96"},{"id":"Slide7009","title":"End of Part 2"}]}