{"metadata":{"generator":"Captivate","generatorVersion":"11.5.1","schemaVersion":"","author":"author","title":"CyberSecurityDraft_Blue_Part2","description":"project description","email":"author@company.com","website":"www.company.com","tags":"","thumbnail":"","source":"assets","durationInFrames":58872,"frameRate":30,"totalSlides":92,"width":1280,"height":720,"responsive":false,"scalable":true,"launchFile":"index_scorm.html","isVRProject":false},"contentStructure":[{"id":"Slide6047","class":"PPTX Slide","instance":"Cybersecurity","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6047"}}},{"id":"Slide6063","class":"PPTX Slide","instance":"Cybersecurity","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6063"}}},{"id":"Slide6079","class":"PPTX Slide","instance":"About the Course","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":441},"navigation":{"navid":"Slide6079"}}},{"id":"Slide6095","class":"PPTX Slide","instance":"Purpose","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1116},"navigation":{"navid":"Slide6095"}}},{"id":"Slide6111","class":"PPTX Slide","instance":"Cybersecurity Policy","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6111"}}},{"id":"Slide6127","class":"PPTX Slide","instance":"What is Non-Public Information?","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":876},"navigation":{"navid":"Slide6127"}}},{"id":"Slide6143","class":"PPTX Slide","instance":"Business-related information that the unauthorized access to, disclosure of, or use would cause an adverse material impact to our business, operations, or security.","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":387},"navigation":{"navid":"Slide6143"}}},{"id":"Slide6159","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":981},"navigation":{"navid":"Slide6159"}}},{"id":"Slide6175","class":"PPTX Slide","instance":"Personal identification information which can be used to identify an individual.","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1104},"navigation":{"navid":"Slide6175"}}},{"id":"Slide6191","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":798},"navigation":{"navid":"Slide6191"}}},{"id":"Slide6207","class":"PPTX Slide","instance":"Protected health information (PHI), in any form or medium created by or derived from a health care provider or an individual and that relates to the past, present, or future health or condition of an individual or their family, provision of health care, or payment for provision of healthcare.","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":693},"navigation":{"navid":"Slide6207"}}},{"id":"Slide6223","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1398},"navigation":{"navid":"Slide6223"}}},{"id":"Slide6239","class":"PPTX Slide","instance":"What is meant by network and system security?","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":978},"navigation":{"navid":"Slide6239"}}},{"id":"Slide6255","class":"PPTX Slide","instance":"Network and System Security","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1563},"navigation":{"navid":"Slide6255"}}},{"id":"Slide6271","class":"PPTX Slide","instance":"Network and System Security","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1050},"navigation":{"navid":"Slide6271"}}},{"id":"Slide6287","class":"PPTX Slide","instance":"Network and System Security","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":468},"navigation":{"navid":"Slide6287"}}},{"id":"Slide6303","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":762},"navigation":{"navid":"Slide6303"}}},{"id":"Slide6319","class":"PPTX Slide","instance":"Remote Access","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":417},"navigation":{"navid":"Slide6319"}}},{"id":"Slide6335","class":"PPTX Slide","instance":"Non-Company Equipment","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":576},"navigation":{"navid":"Slide6335"}}},{"id":"Slide6351","class":"PPTX Slide","instance":"Who Has Access?","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":552},"navigation":{"navid":"Slide6351"}}},{"id":"Slide6367","class":"PPTX Slide","instance":"Device Management","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6367"}}},{"id":"Slide6383","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1104},"navigation":{"navid":"Slide6383"}}},{"id":"Image_32","class":"TODO::Senthil","instance":"Image_32","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide6399","class":"PPTX Slide","instance":"User Responsibilities","thumbnail":"","children":["Image_32"],"roles":{"slide":{"durationInFrames":1269},"navigation":{"navid":"Slide6399"}}},{"id":"Image_33","class":"TODO::Senthil","instance":"Image_33","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide6415","class":"PPTX Slide","instance":"User Responsibilities","thumbnail":"","children":["Image_33"],"roles":{"slide":{"durationInFrames":948},"navigation":{"navid":"Slide6415"}}},{"id":"Slide6431","class":"PPTX Slide","instance":"Former Employees","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":984},"navigation":{"navid":"Slide6431"}}},{"id":"Slide6447","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6447"}}},{"id":"Image_1","class":"TODO::Senthil","instance":"Image_1","roles":{"click":{"subtype":"button","question":"Slide8470q0"},"question":{"interactionId":"8753","quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si8500","class":"TODO::Senthil","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si8507","class":"TODO::Senthil","title":"A network is a set of servers, computers, and other devices that are interconnected in the company called an intranet. ","roles":{"textData":{}}},{"id":"si8522","class":"TODO::Senthil","title":" ","roles":{"textData":{}}},{"id":"si8526","class":"TODO::Senthil","title":"True ","roles":{"textData":{}}},{"id":"si8522_a","class":"TODO::Senthil","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si8533","class":"TODO::Senthil","title":" ","roles":{"textData":{}}},{"id":"si8537","class":"TODO::Senthil","title":"False ","roles":{"textData":{}}},{"id":"si8533_a","class":"TODO::Senthil","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si8567","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8470q0","for":"Slide8470q0"},"textData":{}}},{"id":"si8584","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8470q0","for":"Slide8470q0"},"textData":{}}},{"id":"si8597","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8470q0","for":"Slide8470q0"},"textData":{}}},{"id":"si8541","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide8470q0"},"textData":{}}},{"id":"si8833","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide8470q0"},"textData":{}}},{"id":"si8846","class":"TODO::Senthil","title":"Correct Answer: True, a network is a set of servcers, computers, and other devices interconnected in the company called an intranet. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide8470q0"},"textData":{}}},{"id":"Slide8470","class":"Question Slide","instance":"","thumbnail":"","children":["Image_1","si8500","si8507","si8526","si8537","si8567","si8584","si8597","si8541"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide8470"},"question":{"interactionId":"8487","quizId":379,"title":"Knowledge Check #1\r","text":"A network is a set of servers, computers, and other devices that are interconnected in the company called an intranet.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_2","class":"TODO::Senthil","instance":"Image_2","roles":{"click":{"subtype":"button","question":"Slide8609q1"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si8639","class":"TODO::Senthil","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si8646","class":"TODO::Senthil","title":"Our cybersecurity policy sets forth our policies and procedures for the protection of our information system and our nonpublic information stored on them. ","roles":{"textData":{}}},{"id":"si8661","class":"TODO::Senthil","title":" ","roles":{"textData":{}}},{"id":"si8665","class":"TODO::Senthil","title":"True ","roles":{"textData":{}}},{"id":"si8661_a","class":"TODO::Senthil","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si8672","class":"TODO::Senthil","title":" ","roles":{"textData":{}}},{"id":"si8676","class":"TODO::Senthil","title":"False ","roles":{"textData":{}}},{"id":"si8672_a","class":"TODO::Senthil","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si8706","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8609q1","for":"Slide8609q1"},"textData":{}}},{"id":"si8723","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8609q1","for":"Slide8609q1"},"textData":{}}},{"id":"si8736","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8609q1","for":"Slide8609q1"},"textData":{}}},{"id":"si8680","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide8609q1"},"textData":{}}},{"id":"si8872","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide8609q1"},"textData":{}}},{"id":"si8885","class":"TODO::Senthil","title":"Correct Answer: True, our cybersecurity policy sets forth our policies and procedures for the protection of our information systems and our nonpublic information. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide8609q1"},"textData":{}}},{"id":"Slide8609","class":"Question Slide","instance":"","thumbnail":"","children":["Image_2","si8639","si8646","si8665","si8676","si8706","si8723","si8736","si8680"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide8609"},"question":{"interactionId":"8626","quizId":379,"title":"Knowledge Check #1\r","text":"Type the question here","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["1"]}}},{"id":"Image_3","class":"TODO::Senthil","instance":"Image_3","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"textData":{}}},{"id":"si8361","class":"TODO::Senthil","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si8368","class":"TODO::Senthil","title":"Access to information systems is controlled in order to protect the confidentiality, integrity, and availability of nonpublic information. Select two things you should do to safeguard that information? ","roles":{"textData":{}}},{"id":"si8383","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si8387","class":"TODO::Senthil","title":"We use Secure Sockets Layer (SSL) to provide communications security over our computer network ","roles":{"textData":{}}},{"id":"si8387","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si8383_a","class":"TODO::Senthil","roles":{"answer":{"title":"We use Secure Sockets Layer (SSL) to provide communications security over our computer network\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8394","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si8398","class":"TODO::Senthil","title":"We use email filters to remove spam and computer viruses ","roles":{"textData":{}}},{"id":"si8398","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si8394_a","class":"TODO::Senthil","roles":{"answer":{"title":"We use email filters to remove spam and computer viruses\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8905","class":"TODO::Senthil","title":"c. ","roles":{"textData":{}}},{"id":"si8909","class":"TODO::Senthil","title":"We use DSL for a fast and safe connection ","roles":{"textData":{}}},{"id":"si8909","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si8905_a","class":"TODO::Senthil","roles":{"answer":{"title":"We use DSL for a fast and safe connection\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8428","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8331q2","for":"Slide8331q2"},"textData":{}}},{"id":"si8445","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8331q2","for":"Slide8331q2"},"textData":{}}},{"id":"si8458","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8331q2","for":"Slide8331q2"},"textData":{}}},{"id":"si8402","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"textData":{}}},{"id":"si8913","class":"TODO::Senthil","title":"Try again ","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"textData":{}}},{"id":"si8926","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide8331q2"},"textData":{}}},{"id":"Slide8331","class":"Question Slide","instance":"","thumbnail":"","children":["Image_3","si8361","si8368","si8387","si8398","si8909","si8428","si8445","si8458","si8402","si8913"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide8331"},"question":{"interactionId":"8348","quizId":379,"title":"Knowledge Check #1\r","text":"Access to information systems is controlled in order to protect the confidentiality, integrity, and availability of nonpublic information. Select two things you should do to safeguard that information?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["a","b"]}}},{"id":"Image_4","class":"TODO::Senthil","instance":"Image_4","roles":{"click":{"subtype":"button","question":"Slide8192q3"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si8222","class":"TODO::Senthil","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si8229","class":"TODO::Senthil","title":"Which of the following can be considered nonpublic information? ","roles":{"textData":{}}},{"id":"si8244","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si8248","class":"TODO::Senthil","title":"Business related information ","roles":{"textData":{}}},{"id":"si8244_a","class":"TODO::Senthil","roles":{"answer":{"title":"Business related information\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8255","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si8259","class":"TODO::Senthil","title":"Any security code, access code, or password that permits access to a financial account ","roles":{"textData":{}}},{"id":"si8255_a","class":"TODO::Senthil","roles":{"answer":{"title":"Any security code, access code, or password that permits access to a financial account\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8955","class":"TODO::Senthil","title":"c. ","roles":{"textData":{}}},{"id":"si8959","class":"TODO::Senthil","title":"Driver’s license number ","roles":{"textData":{}}},{"id":"si8955_a","class":"TODO::Senthil","roles":{"answer":{"title":"Driver’s license number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8970","class":"TODO::Senthil","title":"d. ","roles":{"textData":{}}},{"id":"si8974","class":"TODO::Senthil","title":"Credit or debit card number ","roles":{"textData":{}}},{"id":"si8970_a","class":"TODO::Senthil","roles":{"answer":{"title":"Credit or debit card number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8985","class":"TODO::Senthil","title":"e. ","roles":{"textData":{}}},{"id":"si8989","class":"TODO::Senthil","title":"Passport number ","roles":{"textData":{}}},{"id":"si8985_a","class":"TODO::Senthil","roles":{"answer":{"title":"Passport number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9000","class":"TODO::Senthil","title":"f. ","roles":{"textData":{}}},{"id":"si9004","class":"TODO::Senthil","title":"Social Security Identification number (SSI) ","roles":{"textData":{}}},{"id":"si9000_a","class":"TODO::Senthil","roles":{"answer":{"title":"Social Security Identification number (SSI)\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9015","class":"TODO::Senthil","title":"g. ","roles":{"textData":{}}},{"id":"si9019","class":"TODO::Senthil","title":"Financial account number ","roles":{"textData":{}}},{"id":"si9015_a","class":"TODO::Senthil","roles":{"answer":{"title":"Financial account number\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9030","class":"TODO::Senthil","title":"h. ","roles":{"textData":{}}},{"id":"si9034","class":"TODO::Senthil","title":"Protected health information ","roles":{"textData":{}}},{"id":"si9030_a","class":"TODO::Senthil","roles":{"answer":{"title":"Protected health information\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9099","class":"TODO::Senthil","title":"i. ","roles":{"textData":{}}},{"id":"si9103","class":"TODO::Senthil","title":"All of the above ","roles":{"textData":{}}},{"id":"si9099_a","class":"TODO::Senthil","roles":{"answer":{"title":"All of the above \r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8289","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8192q3","for":"Slide8192q3"},"textData":{}}},{"id":"si8306","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8192q3","for":"Slide8192q3"},"textData":{}}},{"id":"si8319","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8192q3","for":"Slide8192q3"},"textData":{}}},{"id":"si8263","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide8192q3"},"textData":{}}},{"id":"si9066","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide8192q3"},"textData":{}}},{"id":"si9079","class":"TODO::Senthil","title":"Correct Answer: All of the above Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide8192q3"},"textData":{}}},{"id":"Slide8192","class":"Question Slide","instance":"","thumbnail":"","children":["Image_4","si8222","si8229","si8248","si8259","si8959","si8974","si8989","si9004","si9019","si9034","si9103","si8289","si8306","si8319","si8263"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide8192"},"question":{"interactionId":"8209","quizId":379,"title":"Knowledge Check #1\r","text":"Which of the following can be considered nonpublic information?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["i"]}}},{"id":"Image_5","class":"TODO::Senthil","instance":"Image_5","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si7944","class":"TODO::Senthil","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si7951","class":"TODO::Senthil","title":"Laptops, smart phones, tablets, and digital storage media are provided by the company to help you do your job. Select all the things you should do to manage these devices in a secure manner. ","roles":{"textData":{}}},{"id":"si7966","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si7970","class":"TODO::Senthil","title":"Leave your device in the seat in your car ","roles":{"textData":{}}},{"id":"si7970","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si7966_a","class":"TODO::Senthil","roles":{"answer":{"title":"Leave your device in the seat in your car\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si7977","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si7981","class":"TODO::Senthil","title":" Do not share passwords or other access information ","roles":{"textData":{}}},{"id":"si7981","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si7977_a","class":"TODO::Senthil","roles":{"answer":{"title":" Do not share passwords or other access information\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9114","class":"TODO::Senthil","title":"c. ","roles":{"textData":{}}},{"id":"si9118","class":"TODO::Senthil","title":"Any authorized devices must be password protected and encrypted ","roles":{"textData":{}}},{"id":"si9118","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si9114_a","class":"TODO::Senthil","roles":{"answer":{"title":"Any authorized devices must be password protected and encrypted\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9129","class":"TODO::Senthil","title":"d. ","roles":{"textData":{}}},{"id":"si9133","class":"TODO::Senthil","title":"You can store nonpublic information on your non-company equipment or device ","roles":{"textData":{}}},{"id":"si9133","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si9129_a","class":"TODO::Senthil","roles":{"answer":{"title":"You can store nonpublic information on your non-company equipment or device\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8011","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide7914q4","for":"Slide7914q4"},"textData":{}}},{"id":"si8028","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide7914q4","for":"Slide7914q4"},"textData":{}}},{"id":"si8041","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide7914q4","for":"Slide7914q4"},"textData":{}}},{"id":"si7985","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"textData":{}}},{"id":"si9162","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"textData":{}}},{"id":"si9175","class":"TODO::Senthil","title":"Correct Answers: Do not share your passwords or other access infomration AND any authorized devices must be password protected and encrypted. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide7914q4"},"textData":{}}},{"id":"Slide7914","class":"Question Slide","instance":"","thumbnail":"","children":["Image_5","si7944","si7951","si7970","si7981","si9118","si9133","si8011","si8028","si8041","si7985"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7914"},"question":{"interactionId":"7931","quizId":379,"title":"Knowledge Check #1\r","text":"Laptops, smart phones, tablets, and digital storage media are provided by the company to help you do your job. Select all the things you should do to manage these devices in a secure manner.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["b","c"]}}},{"id":"Image_6","class":"TODO::Senthil","instance":"Image_6","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si8083","class":"TODO::Senthil","title":"Knowledge Check #1 ","roles":{"textData":{}}},{"id":"si8090","class":"TODO::Senthil","title":"Our networks and systems are protected from and monitored for any attempt to gain unauthorized access to, disrupt, or misuse our information systems or the nonpublic informatin stored on them. Select all things that we do to protect our systems and networks. ","roles":{"textData":{}}},{"id":"si8105","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si8109","class":"TODO::Senthil","title":"Our boundry monitors and controls incoming and outgoing network traffic based on predetermined security rules. ","roles":{"textData":{}}},{"id":"si8109","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si8105_a","class":"TODO::Senthil","roles":{"answer":{"title":"Our boundry monitors and controls incoming and outgoing network traffic based on predetermined security rules.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8116","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si8120","class":"TODO::Senthil","title":"Unauthorized software is either removed or the software asset inventory is updated as soon as possible. ","roles":{"textData":{}}},{"id":"si8120","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si8116_a","class":"TODO::Senthil","roles":{"answer":{"title":"Unauthorized software is either removed or the software asset inventory is updated as soon as possible.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si9195","class":"TODO::Senthil","title":"c. ","roles":{"textData":{}}},{"id":"si9199","class":"TODO::Senthil","title":"Email filters remove spam and computers viruses. ","roles":{"textData":{}}},{"id":"si9199","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si9195_a","class":"TODO::Senthil","roles":{"answer":{"title":"Email filters remove spam and computers viruses.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si8150","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8053q5","for":"Slide8053q5"},"textData":{}}},{"id":"si8167","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8053q5","for":"Slide8053q5"},"textData":{}}},{"id":"si8180","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide8053q5","for":"Slide8053q5"},"textData":{}}},{"id":"si8124","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"textData":{}}},{"id":"si9225","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"textData":{}}},{"id":"si9238","class":"TODO::Senthil","title":"Correct Answers: All of the above, a., b., and c. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide8053q5"},"textData":{}}},{"id":"Slide8053","class":"Question Slide","instance":"","thumbnail":"","children":["Image_6","si8083","si8090","si8109","si8120","si9199","si8150","si8167","si8180","si8124"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide8053"},"question":{"interactionId":"8070","quizId":379,"title":"Knowledge Check #1\r","text":"Our networks and systems are protected from and monitored for any attempt to gain unauthorized access to, disrupt, or misuse our information systems or the nonpublic informatin stored on them. Select all things that we do to protect our systems and networks.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["a","b","c"]}}},{"id":"Slide6559","class":"PPTX Slide","instance":"Data Control & Access","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6559"}}},{"id":"Slide6575","class":"PPTX Slide","instance":"Data Control and Access","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1125},"navigation":{"navid":"Slide6575"}}},{"id":"Slide6591","class":"PPTX Slide","instance":"Internal Control and Access","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":912},"navigation":{"navid":"Slide6591"}}},{"id":"Slide6607","class":"PPTX Slide","instance":"Internal Control and Access","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":813},"navigation":{"navid":"Slide6607"}}},{"id":"Slide6623","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":144},"navigation":{"navid":"Slide6623"}}},{"id":"Slide6639","class":"PPTX Slide","instance":"Internal Control and Access","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":525},"navigation":{"navid":"Slide6639"}}},{"id":"Slide6655","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1077},"navigation":{"navid":"Slide6655"}}},{"id":"Slide6671","class":"PPTX Slide","instance":"Disaster Recovery & Business Continuity","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":696},"navigation":{"navid":"Slide6671"}}},{"id":"Slide6687","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6687"}}},{"id":"Image_7","class":"TODO::Senthil","instance":"Image_7","roles":{"click":{"subtype":"button","question":"Slide9251q6"},"question":{"interactionId":"9812","quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si9281","class":"TODO::Senthil","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si9288","class":"TODO::Senthil","title":"As part of our cyber security policy, we limit user access privileges for information systems that provide access to nonpublic information. ","roles":{"textData":{}}},{"id":"si9303","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si9307","class":"TODO::Senthil","title":"True ","roles":{"textData":{}}},{"id":"si9303_a","class":"TODO::Senthil","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si9314","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si9318","class":"TODO::Senthil","title":"False ","roles":{"textData":{}}},{"id":"si9314_a","class":"TODO::Senthil","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si9348","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide9251q6","for":"Slide9251q6"},"textData":{}}},{"id":"si9365","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide9251q6","for":"Slide9251q6"},"textData":{}}},{"id":"si9378","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide9251q6","for":"Slide9251q6"},"textData":{}}},{"id":"si9322","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide9251q6"},"textData":{}}},{"id":"si9868","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide9251q6"},"textData":{}}},{"id":"si9881","class":"TODO::Senthil","title":"Correct Answer: True, as part of our cyber security policy, we limit user access privileges for information systems that provide access to nonpublic information Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide9251q6"},"textData":{}}},{"id":"Slide9251","class":"Question Slide","instance":"","thumbnail":"","children":["Image_7","si9281","si9288","si9307","si9318","si9348","si9365","si9378","si9322"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide9251"},"question":{"interactionId":"9268","quizId":379,"title":"Knowledge Check #2\r","text":"As part of our cyber security policy, we limit user access privileges for information systems that provide access to nonpublic information.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_13","class":"TODO::Senthil","instance":"Image_13","roles":{"click":{"subtype":"button","question":"Slide10547q7"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si10371","class":"TODO::Senthil","instance":"Text_Caption_13","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si10383","class":"TODO::Senthil","instance":"Text_Caption_14","title":"It is OK to leave your computer unlocked if you are just leaving it unattended for a few minutes. ","roles":{"textData":{}}},{"id":"si10394","class":"TODO::Senthil","instance":"Text_Caption_15","title":"a. ","roles":{"textData":{}}},{"id":"si10398","class":"TODO::Senthil","instance":"Text_Caption_16","title":"True ","roles":{"textData":{}}},{"id":"si10394_a","class":"TODO::Senthil","instance":"12","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si10405","class":"TODO::Senthil","instance":"Text_Caption_17","title":"b. ","roles":{"textData":{}}},{"id":"si10409","class":"TODO::Senthil","instance":"Text_Caption_18","title":"False ","roles":{"textData":{}}},{"id":"si10405_a","class":"TODO::Senthil","instance":"14","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si10477","class":"TODO::Senthil","instance":"Button_3","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10547q7","for":"Slide10547q7"},"textData":{}}},{"id":"si10489","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10547q7","for":"Slide10547q7"},"textData":{}}},{"id":"si10501","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10547q7","for":"Slide10547q7"},"textData":{}}},{"id":"si10447","class":"TODO::Senthil","instance":"SmartShape_7","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide10547q7"},"textData":{}}},{"id":"si10520","class":"TODO::Senthil","instance":"SmartShape_8","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide10547q7"},"textData":{}}},{"id":"si10533","class":"TODO::Senthil","instance":"SmartShape_9","title":"Correct Answer: False, you should never leave your computer unattended and unlocked. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide10547q7"},"textData":{}}},{"id":"Slide10547","class":"Question Slide","instance":"","thumbnail":"","children":["Image_13","si10371","si10383","si10398","si10409","si10477","si10489","si10501","si10447"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide10547"},"question":{"interactionId":"10344","quizId":379,"title":"Knowledge Check #2\r","text":"It is OK to leave your computer unlocked if you are just leaving it unattended for a few minutes.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["b"]}}},{"id":"Image_12","class":"TODO::Senthil","instance":"Image_12","roles":{"click":{"subtype":"button","question":"Slide10329q8"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si10153","class":"TODO::Senthil","instance":"Text_Caption_7","title":"Knowledge Check #2 ","roles":{"textData":{}}},{"id":"si10165","class":"TODO::Senthil","instance":"Text_Caption_8","title":"You should report all actual or potential unathorized access to, use of, or disclosure of nonpublic information to the Help Desk. ","roles":{"textData":{}}},{"id":"si10176","class":"TODO::Senthil","instance":"Text_Caption_9","title":"a. ","roles":{"textData":{}}},{"id":"si10180","class":"TODO::Senthil","instance":"Text_Caption_10","title":"True ","roles":{"textData":{}}},{"id":"si10176_a","class":"TODO::Senthil","instance":"7","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si10187","class":"TODO::Senthil","instance":"Text_Caption_11","title":"b. ","roles":{"textData":{}}},{"id":"si10191","class":"TODO::Senthil","instance":"Text_Caption_12","title":"False ","roles":{"textData":{}}},{"id":"si10187_a","class":"TODO::Senthil","instance":"9","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si10259","class":"TODO::Senthil","instance":"Button_2","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10329q8","for":"Slide10329q8"},"textData":{}}},{"id":"si10271","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10329q8","for":"Slide10329q8"},"textData":{}}},{"id":"si10283","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10329q8","for":"Slide10329q8"},"textData":{}}},{"id":"si10229","class":"TODO::Senthil","instance":"SmartShape_4","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide10329q8"},"textData":{}}},{"id":"si10302","class":"TODO::Senthil","instance":"SmartShape_5","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide10329q8"},"textData":{}}},{"id":"si10315","class":"TODO::Senthil","instance":"SmartShape_6","title":"Correct Answer: True, all actual or potential unauthorized access should be immediately reported to Help Desk. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide10329q8"},"textData":{}}},{"id":"Slide10329","class":"Question Slide","instance":"","thumbnail":"","children":["Image_12","si10153","si10165","si10180","si10191","si10259","si10271","si10283","si10229"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide10329"},"question":{"interactionId":"10126","quizId":379,"title":"Knowledge Check #2\r","text":"You should report all actual or potential unathorized access to, use of, or disclosure of nonpublic information to the Help Desk.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Slide6767","class":"PPTX Slide","instance":"Learner Activity","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":471},"navigation":{"navid":"Slide6767"}}},{"id":"Slide6783","class":"PPTX Slide","instance":"Employee Responsibilities & Best Practices","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6783"}}},{"id":"Slide6799","class":"PPTX Slide","instance":"Never underestimate your importance to cybersecurity.","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1245},"navigation":{"navid":"Slide6799"}}},{"id":"Slide6815","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":135},"navigation":{"navid":"Slide6815"}}},{"id":"Slide6831","class":"PPTX Slide","instance":"Laptop Usage","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6831"}}},{"id":"Slide6847","class":"PPTX Slide","instance":"Reviewing Your Responsibilities","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":639},"navigation":{"navid":"Slide6847"}}},{"id":"Slide6879","class":"PPTX Slide","instance":"Best Practices – Wi-Fi","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1887},"navigation":{"navid":"Slide6879"}}},{"id":"Slide6895","class":"PPTX Slide","instance":"Best Practices - Passwords","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1068},"navigation":{"navid":"Slide6895"}}},{"id":"Slide6911","class":"PPTX Slide","instance":"Best Practices - Passwords","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":489},"navigation":{"navid":"Slide6911"}}},{"id":"Slide6927","class":"PPTX Slide","instance":"Password Hints","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1644},"navigation":{"navid":"Slide6927"}}},{"id":"Slide6943","class":"PPTX Slide","instance":"Password Security","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":867},"navigation":{"navid":"Slide6943"}}},{"id":"Slide6959","class":"PPTX Slide","instance":"Mobile Device Usage","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide6959"}}},{"id":"Slide6975","class":"PPTX Slide","instance":"Reviewing Your Responsibilities","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":864},"navigation":{"navid":"Slide6975"}}},{"id":"Slide6991","class":"PPTX Slide","instance":"Personal Owned Devices Policy","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":453},"navigation":{"navid":"Slide6991"}}},{"id":"Slide7007","class":"PPTX Slide","instance":"Best Practices – Personal Devices","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":3165},"navigation":{"navid":"Slide7007"}}},{"id":"Slide7023","class":"PPTX Slide","instance":"Internet Usage","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7023"}}},{"id":"Slide7039","class":"PPTX Slide","instance":"Best Practices – Internet Usage","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1575},"navigation":{"navid":"Slide7039"}}},{"id":"Slide7183","class":"PPTX Slide","instance":"Best Practices","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":2019},"navigation":{"navid":"Slide7183"}}},{"id":"Slide7055","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7055"}}},{"id":"Image_17","class":"TODO::Senthil","instance":"Image_17","roles":{"click":{"subtype":"button","question":"Slide10965q9"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si10995","class":"TODO::Senthil","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si11002","class":"TODO::Senthil","title":"Employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can lead to data loss or a data breach. ","roles":{"textData":{}}},{"id":"si11017","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si11021","class":"TODO::Senthil","title":"True ","roles":{"textData":{}}},{"id":"si11017_a","class":"TODO::Senthil","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si11028","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si11032","class":"TODO::Senthil","title":"False ","roles":{"textData":{}}},{"id":"si11028_a","class":"TODO::Senthil","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si11062","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10965q9","for":"Slide10965q9"},"textData":{}}},{"id":"si11079","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10965q9","for":"Slide10965q9"},"textData":{}}},{"id":"si11092","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10965q9","for":"Slide10965q9"},"textData":{}}},{"id":"si11036","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide10965q9"},"textData":{}}},{"id":"si11467","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide10965q9"},"textData":{}}},{"id":"si11531","class":"TODO::Senthil","title":"Correct Answer: Employee error can lead to data loss or a data breach Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide10965q9"},"textData":{}}},{"id":"Slide10965","class":"Question Slide","instance":"","thumbnail":"","children":["Image_17","si10995","si11002","si11021","si11032","si11062","si11079","si11092","si11036"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide10965"},"question":{"interactionId":"10982","quizId":379,"title":"Knowledge Check #3\r","text":"Employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can lead to data loss or a data breach.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_14","class":"TODO::Senthil","instance":"Image_14","roles":{"click":{"subtype":"button","question":"Slide10548q10"},"textData":{}}},{"id":"si10578","class":"TODO::Senthil","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si10585","class":"TODO::Senthil","title":"What key sequence can you use to lock your screen when you step away from your computer? ","roles":{"textData":{}}},{"id":"si10600","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si10604","class":"TODO::Senthil","title":"CTRL + ALT + DELETE ","roles":{"textData":{}}},{"id":"si10600_a","class":"TODO::Senthil","roles":{"answer":{"title":"CTRL + ALT + DELETE\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si10611","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si10615","class":"TODO::Senthil","title":"CTRL + ALT + SHIFT ","roles":{"textData":{}}},{"id":"si10611_a","class":"TODO::Senthil","roles":{"answer":{"title":"CTRL + ALT + SHIFT\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si10645","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10548q10","for":"Slide10548q10"},"textData":{}}},{"id":"si10662","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10548q10","for":"Slide10548q10"},"textData":{}}},{"id":"si10675","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide10548q10","for":"Slide10548q10"},"textData":{}}},{"id":"si10619","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide10548q10"},"textData":{}}},{"id":"si11557","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide10548q10"},"textData":{}}},{"id":"si11570","class":"TODO::Senthil","title":"Correct Answer: CTRL + ALT + DELETE Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide10548q10"},"textData":{}}},{"id":"Slide10548","class":"Question Slide","instance":"","thumbnail":"","children":["Image_14","si10578","si10585","si10604","si10615","si10645","si10662","si10675","si10619"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide10548"},"question":{"interactionId":"10565","quizId":379,"title":"Knowledge Check #3\r","text":"What key sequence can you use to lock your screen when you step away from your computer?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_20","class":"TODO::Senthil","instance":"Image_20","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"question":{"interactionId":"11603","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si11624","class":"TODO::Senthil","instance":"Text_Caption_19","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si11636","class":"TODO::Senthil","instance":"Text_Caption_20","title":"Select all the conventions listed below that make for a strong password. ","roles":{"textData":{}}},{"id":"si11647","class":"TODO::Senthil","instance":"Text_Caption_21","title":"a. ","roles":{"textData":{}}},{"id":"si11651","class":"TODO::Senthil","instance":"Text_Caption_22","title":"Your pet’s name ","roles":{"textData":{}}},{"id":"si11651","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si11647_a","class":"TODO::Senthil","roles":{"answer":{"title":"Your pet’s name\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11658","class":"TODO::Senthil","instance":"Text_Caption_23","title":"b. ","roles":{"textData":{}}},{"id":"si11662","class":"TODO::Senthil","instance":"Text_Caption_24","title":"Change common words by substituting letters with numbers and punctuation marks or symbols ","roles":{"textData":{}}},{"id":"si11662","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si11658_a","class":"TODO::Senthil","roles":{"answer":{"title":"Change common words by substituting letters with numbers and punctuation marks or symbols\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12027","class":"TODO::Senthil","title":"c. ","roles":{"textData":{}}},{"id":"si12031","class":"TODO::Senthil","title":"Use phonetic replacements ","roles":{"textData":{}}},{"id":"si12031","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si12027_a","class":"TODO::Senthil","roles":{"answer":{"title":"Use phonetic replacements\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12042","class":"TODO::Senthil","title":"d. ","roles":{"textData":{}}},{"id":"si12046","class":"TODO::Senthil","title":"Make deliberate but obvious misspellings ","roles":{"textData":{}}},{"id":"si12046","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si12042_a","class":"TODO::Senthil","roles":{"answer":{"title":"Make deliberate but obvious misspellings\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12057","class":"TODO::Senthil","title":"e. ","roles":{"textData":{}}},{"id":"si12061","class":"TODO::Senthil","title":"All of the above ","roles":{"textData":{}}},{"id":"si12061","class":"TODO::Senthil","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si12057_a","class":"TODO::Senthil","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si11730","class":"TODO::Senthil","instance":"Button_4","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11800q11","for":"Slide11800q11"},"textData":{}}},{"id":"si11742","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11800q11","for":"Slide11800q11"},"textData":{}}},{"id":"si11754","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide11800q11","for":"Slide11800q11"},"textData":{}}},{"id":"si11700","class":"TODO::Senthil","instance":"SmartShape_10","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"textData":{}}},{"id":"si11773","class":"TODO::Senthil","instance":"SmartShape_11","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"textData":{}}},{"id":"si11786","class":"TODO::Senthil","instance":"SmartShape_12","title":"Correct Answers: Change common words by substituting letters with numbers or symbols AND Use phonetic replacements AND Make deliberate but obvious misspellings Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide11800q11"},"textData":{}}},{"id":"Slide11800","class":"Question Slide","instance":"","thumbnail":"","children":["Image_20","si11624","si11636","si11651","si11662","si12031","si12046","si12061","si11730","si11742","si11754","si11700"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide11800"},"question":{"interactionId":"11597","quizId":379,"title":"Knowledge Check #3\r","text":"Select all the conventions listed below that make for a strong password. \r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["b","c","d"]}}},{"id":"Image_22","class":"TODO::Senthil","instance":"Image_22","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"question":{"quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si12133","class":"TODO::Senthil","instance":"Text_Caption_31","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si12145","class":"TODO::Senthil","instance":"Text_Caption_32","title":"Why should you avoid conducting sensitive activities through public networks? Select all correct answers. ","roles":{"textData":{}}},{"id":"si12156","class":"TODO::Senthil","instance":"Text_Caption_33","title":"a. ","roles":{"textData":{}}},{"id":"si12160","class":"TODO::Senthil","instance":"Text_Caption_34","title":"They are not always secure and do not encrypt information you send over the Internet. ","roles":{"textData":{}}},{"id":"si12160","class":"TODO::Senthil","instance":"27","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si12156_a","class":"TODO::Senthil","instance":"26","roles":{"answer":{"title":"They are not always secure and do not encrypt information you send over the Internet.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12167","class":"TODO::Senthil","instance":"Text_Caption_35","title":"b. ","roles":{"textData":{}}},{"id":"si12171","class":"TODO::Senthil","instance":"Text_Caption_36","title":"They can expose you to cybersecurity threats. ","roles":{"textData":{}}},{"id":"si12171","class":"TODO::Senthil","instance":"29","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si12167_a","class":"TODO::Senthil","instance":"28","roles":{"answer":{"title":"They can expose you to cybersecurity threats.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12178","class":"TODO::Senthil","instance":"Text_Caption_37","title":"c. ","roles":{"textData":{}}},{"id":"si12182","class":"TODO::Senthil","instance":"Text_Caption_38","title":"They can present an opportunity for others to steal sensitive information ","roles":{"textData":{}}},{"id":"si12182","class":"TODO::Senthil","instance":"31","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"answer":{"title":"dummy title","index":-1,"score":{}}}},{"id":"si12178_a","class":"TODO::Senthil","instance":"30","roles":{"answer":{"title":"They can present an opportunity for others to steal sensitive information\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12272","class":"TODO::Senthil","instance":"Button_6","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12342q12","for":"Slide12342q12"},"textData":{}}},{"id":"si12284","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12342q12","for":"Slide12342q12"},"textData":{}}},{"id":"si12296","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12342q12","for":"Slide12342q12"},"textData":{}}},{"id":"si12242","class":"TODO::Senthil","instance":"SmartShape_16","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"textData":{}}},{"id":"si12315","class":"TODO::Senthil","instance":"SmartShape_17","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"textData":{}}},{"id":"si12328","class":"TODO::Senthil","instance":"SmartShape_18","title":"Correct Answer: All of the above are reason to avoid conducting sensitive activities through public networks. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide12342q12"},"textData":{}}},{"id":"Slide12342","class":"Question Slide","instance":"","thumbnail":"","children":["Image_22","si12133","si12145","si12160","si12171","si12182","si12272","si12284","si12296","si12242"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide12342"},"question":{"interactionId":"12106","quizId":379,"title":"Knowledge Check #3\r","text":"Why should you avoid conducting sensitive activities through public networks? Select all correct answers.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["a","b","c"]}}},{"id":"Image_23","class":"TODO::Senthil","instance":"Image_23","roles":{"click":{"subtype":"button","question":"Slide12561q13"},"textData":{}}},{"id":"si12385","class":"TODO::Senthil","instance":"Text_Caption_43","title":"Knowledge Check #3 ","roles":{"textData":{}}},{"id":"si12397","class":"TODO::Senthil","instance":"Text_Caption_44","title":"You have a responsibility to lock your device with a passcode, touch ID, or other biometric. ","roles":{"textData":{}}},{"id":"si12408","class":"TODO::Senthil","instance":"Text_Caption_45","title":"a. ","roles":{"textData":{}}},{"id":"si12412","class":"TODO::Senthil","instance":"Text_Caption_46","title":"True ","roles":{"textData":{}}},{"id":"si12408_a","class":"TODO::Senthil","instance":"22_25","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si12419","class":"TODO::Senthil","instance":"Text_Caption_47","title":"b. ","roles":{"textData":{}}},{"id":"si12423","class":"TODO::Senthil","instance":"Text_Caption_48","title":"False ","roles":{"textData":{}}},{"id":"si12419_a","class":"TODO::Senthil","instance":"24_26","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si12491","class":"TODO::Senthil","instance":"Button_7","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12561q13","for":"Slide12561q13"},"textData":{}}},{"id":"si12503","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12561q13","for":"Slide12561q13"},"textData":{}}},{"id":"si12515","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12561q13","for":"Slide12561q13"},"textData":{}}},{"id":"si12461","class":"TODO::Senthil","instance":"SmartShape_19","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide12561q13"},"textData":{}}},{"id":"si12534","class":"TODO::Senthil","instance":"SmartShape_20","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide12561q13"},"textData":{}}},{"id":"si12547","class":"TODO::Senthil","instance":"SmartShape_21","title":"Correct Answer: True, you have a responsibility to lock your device in order to protect non-public information. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide12561q13"},"textData":{}}},{"id":"Slide12561","class":"Question Slide","instance":"","thumbnail":"","children":["Image_23","si12385","si12397","si12412","si12423","si12491","si12503","si12515","si12461"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide12561"},"question":{"interactionId":"12357","quizId":379,"title":"Knowledge Check #3\r","text":"You have a responsibility to lock your device with a passcode, touch ID, or other biometric.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["a"]}}},{"id":"Image_31","class":"TODO::Senthil","instance":"Image_31","roles":{"click":{"subtype":"button","question":"Slide14168q14"},"question":{"interactionId":"13949","quizId":379,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si13970","class":"TODO::Senthil","instance":"Text_Caption_69","title":"Knowledge Check # 3 ","roles":{"textData":{}}},{"id":"si13982","class":"TODO::Senthil","instance":"Text_Caption_70","title":"Who is responsible for the security of your social media sites? ","roles":{"textData":{}}},{"id":"si13993","class":"TODO::Senthil","instance":"Text_Caption_71","title":"a. ","roles":{"textData":{}}},{"id":"si13997","class":"TODO::Senthil","instance":"Text_Caption_72","title":"Facebook ","roles":{"textData":{}}},{"id":"si13993_a","class":"TODO::Senthil","instance":"55","roles":{"answer":{"title":"Facebook\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si14004","class":"TODO::Senthil","instance":"Text_Caption_73","title":"b. ","roles":{"textData":{}}},{"id":"si14008","class":"TODO::Senthil","instance":"Text_Caption_74","title":"Twitter ","roles":{"textData":{}}},{"id":"si14004_a","class":"TODO::Senthil","instance":"57","roles":{"answer":{"title":"Twitter\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si14015","class":"TODO::Senthil","instance":"Text_Caption_75","title":"c. ","roles":{"textData":{}}},{"id":"si14019","class":"TODO::Senthil","instance":"Text_Caption_76","title":"You are ","roles":{"textData":{}}},{"id":"si14015_a","class":"TODO::Senthil","instance":"59","roles":{"answer":{"title":"You are\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si14026","class":"TODO::Senthil","instance":"Text_Caption_77","title":"d. ","roles":{"textData":{}}},{"id":"si14030","class":"TODO::Senthil","instance":"Text_Caption_78","title":"YouTube ","roles":{"textData":{}}},{"id":"si14026_a","class":"TODO::Senthil","instance":"61","roles":{"answer":{"title":"YouTube\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si14098","class":"TODO::Senthil","instance":"Button_10","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide14168q14","for":"Slide14168q14"},"textData":{}}},{"id":"si14110","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide14168q14","for":"Slide14168q14"},"textData":{}}},{"id":"si14122","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide14168q14","for":"Slide14168q14"},"textData":{}}},{"id":"si14068","class":"TODO::Senthil","instance":"SmartShape_28","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide14168q14"},"textData":{}}},{"id":"si14141","class":"TODO::Senthil","instance":"SmartShape_29","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide14168q14"},"textData":{}}},{"id":"si14154","class":"TODO::Senthil","instance":"SmartShape_30","title":"Correct Answer: You are responsible for the security of your social media sites. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide14168q14"},"textData":{}}},{"id":"Slide14168","class":"Question Slide","instance":"","thumbnail":"","children":["Image_31","si13970","si13982","si13997","si14008","si14019","si14030","si14098","si14110","si14122","si14068"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide14168"},"question":{"interactionId":"13943","quizId":379,"title":"Knowledge Check # 3\r","text":"Who is responsible for the security of your social media sites? \r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["c"]}}},{"id":"Slide7199","class":"PPTX Slide","instance":"Email Usage","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7199"}}},{"id":"Slide7215","class":"PPTX Slide","instance":"","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":591},"navigation":{"navid":"Slide7215"}}},{"id":"Slide7231","class":"PPTX Slide","instance":"Email Usage","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":885},"navigation":{"navid":"Slide7231"}}},{"id":"Slide7247","class":"PPTX Slide","instance":"Best Practices - Email","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":762},"navigation":{"navid":"Slide7247"}}},{"id":"Slide7263","class":"PPTX Slide","instance":"Best Practices - Email","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":678},"navigation":{"navid":"Slide7263"}}},{"id":"Slide7279","class":"PPTX Slide","instance":"Encryption","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":852},"navigation":{"navid":"Slide7279"}}},{"id":"Slide7295","class":"PPTX Slide","instance":"Protecting Company & Client Data","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7295"}}},{"id":"Slide7311","class":"PPTX Slide","instance":"Reviewing Your Responsibilities","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":2412},"navigation":{"navid":"Slide7311"}}},{"id":"Slide7343","class":"PPTX Slide","instance":"Best Practices – Hard Copies","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":747},"navigation":{"navid":"Slide7343"}}},{"id":"Slide7359","class":"PPTX Slide","instance":"Best Practices – Verbal Communication","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1014},"navigation":{"navid":"Slide7359"}}},{"id":"Slide7375","class":"PPTX Slide","instance":"Recognizing Threats","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7375"}}},{"id":"Slide7391","class":"PPTX Slide","instance":"Phishing Attacks","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1182},"navigation":{"navid":"Slide7391"}}},{"id":"Highlight_Box_1","class":"TODO::Senthil","instance":"Highlight_Box_1","roles":{}},{"id":"Highlight_Box_3","class":"TODO::Senthil","instance":"Highlight_Box_3","roles":{}},{"id":"Highlight_Box_4","class":"TODO::Senthil","instance":"Highlight_Box_4","roles":{}},{"id":"Highlight_Box_5","class":"TODO::Senthil","instance":"Highlight_Box_5","roles":{}},{"id":"Highlight_Box_2","class":"TODO::Senthil","instance":"Highlight_Box_2","roles":{}},{"id":"Slide7407","class":"PPTX Slide","instance":"","thumbnail":"","children":["Highlight_Box_1","Highlight_Box_3","Highlight_Box_4","Highlight_Box_5","Highlight_Box_2"],"roles":{"slide":{"durationInFrames":1842},"navigation":{"navid":"Slide7407"}}},{"id":"Slide7423","class":"PPTX Slide","instance":"Phishing Examples","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1035},"navigation":{"navid":"Slide7423"}}},{"id":"Slide7439","class":"PPTX Slide","instance":"Symptoms of Cybersecurity Events","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1236},"navigation":{"navid":"Slide7439"}}},{"id":"Slide7455","class":"PPTX Slide","instance":"Reporting Threats","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":1239},"navigation":{"navid":"Slide7455"}}},{"id":"Slide7471","class":"PPTX Slide","instance":"New Threats","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":717},"navigation":{"navid":"Slide7471"}}},{"id":"Slide7487","class":"PPTX Slide","instance":"Self-Check","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide7487"}}},{"id":"Image_24","class":"TODO::Senthil","instance":"Image_24","roles":{"click":{"subtype":"button","question":"Slide12562q15"},"textData":{}}},{"id":"si12592","class":"TODO::Senthil","title":"Knowledge Check # 4 ","roles":{"textData":{}}},{"id":"si12599","class":"TODO::Senthil","title":"You are visiting a website (for business purposes, of course) and a suspicious pop-up window appears. What should you do? ","roles":{"textData":{}}},{"id":"si12614","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si12618","class":"TODO::Senthil","title":"Click Cancel ","roles":{"textData":{}}},{"id":"si12614_a","class":"TODO::Senthil","roles":{"answer":{"title":"Click Cancel\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12625","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si12629","class":"TODO::Senthil","title":"Click OK ","roles":{"textData":{}}},{"id":"si12625_a","class":"TODO::Senthil","roles":{"answer":{"title":"Click OK\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13324","class":"TODO::Senthil","title":"c. ","roles":{"textData":{}}},{"id":"si13328","class":"TODO::Senthil","title":"Click the close button (X) ","roles":{"textData":{}}},{"id":"si13324_a","class":"TODO::Senthil","roles":{"answer":{"title":"Click the close button (X)\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si12659","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12562q15","for":"Slide12562q15"},"textData":{}}},{"id":"si12676","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12562q15","for":"Slide12562q15"},"textData":{}}},{"id":"si12689","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide12562q15","for":"Slide12562q15"},"textData":{}}},{"id":"si12633","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide12562q15"},"textData":{}}},{"id":"si13360","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide12562q15"},"textData":{}}},{"id":"si13373","class":"TODO::Senthil","title":"Correct Answer: Click the close button (X) Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide12562q15"},"textData":{}}},{"id":"Slide12562","class":"Question Slide","instance":"","thumbnail":"","children":["Image_24","si12592","si12599","si12618","si12629","si13328","si12659","si12676","si12689","si12633"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide12562"},"question":{"interactionId":"12579","quizId":379,"title":"Knowledge Check # 4\r","text":"You are visiting a website (for business purposes, of course) and a suspicious pop-up window appears. What should you do?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["c"]}}},{"id":"Image_30","class":"TODO::Senthil","instance":"Image_30","roles":{"click":{"subtype":"button","question":"Slide13920q16"},"textData":{}}},{"id":"si13722","class":"TODO::Senthil","instance":"Text_Caption_59","title":"Knowledge Check # 4 ","roles":{"textData":{}}},{"id":"si13734","class":"TODO::Senthil","instance":"Text_Caption_60","title":"Before you open an email message, respond to requests to click on links, or download attachments what can you do to confirm that the message is safe? ","roles":{"textData":{}}},{"id":"si13745","class":"TODO::Senthil","instance":"Text_Caption_61","title":"a. ","roles":{"textData":{}}},{"id":"si13749","class":"TODO::Senthil","instance":"Text_Caption_62","title":"The message comes from someone you know or who has sent you an email in the past. ","roles":{"textData":{}}},{"id":"si13745_a","class":"TODO::Senthil","roles":{"answer":{"title":"The message comes from someone you know or who has sent you an email in the past.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13756","class":"TODO::Senthil","instance":"Text_Caption_63","title":"b. ","roles":{"textData":{}}},{"id":"si13760","class":"TODO::Senthil","instance":"Text_Caption_64","title":"The message is something you were expecting. ","roles":{"textData":{}}},{"id":"si13756_a","class":"TODO::Senthil","roles":{"answer":{"title":"The message is something you were expecting.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13767","class":"TODO::Senthil","instance":"Text_Caption_65","title":"c. ","roles":{"textData":{}}},{"id":"si13771","class":"TODO::Senthil","instance":"Text_Caption_66","title":"The message does not look out of the ordinary with incorrect spelling or unusual characters. ","roles":{"textData":{}}},{"id":"si13767_a","class":"TODO::Senthil","roles":{"answer":{"title":"The message does not look out of the ordinary with incorrect spelling or unusual characters.\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13778","class":"TODO::Senthil","instance":"Text_Caption_67","title":"d. ","roles":{"textData":{}}},{"id":"si13782","class":"TODO::Senthil","instance":"Text_Caption_68","title":"All of the above ","roles":{"textData":{}}},{"id":"si13778_a","class":"TODO::Senthil","roles":{"answer":{"title":"All of the above\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13850","class":"TODO::Senthil","instance":"Button_9","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13920q16","for":"Slide13920q16"},"textData":{}}},{"id":"si13862","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13920q16","for":"Slide13920q16"},"textData":{}}},{"id":"si13874","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13920q16","for":"Slide13920q16"},"textData":{}}},{"id":"si13820","class":"TODO::Senthil","instance":"SmartShape_25","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide13920q16"},"textData":{}}},{"id":"si13893","class":"TODO::Senthil","instance":"SmartShape_26","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide13920q16"},"textData":{}}},{"id":"si13906","class":"TODO::Senthil","instance":"SmartShape_27","title":"Correct Answer: All the above - We should ensure the message is from a known sender or is expected. We should also check that the message is legitimate and not full of gramatical errors. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide13920q16"},"textData":{}}},{"id":"Slide13920","class":"Question Slide","instance":"","thumbnail":"","children":["Image_30","si13722","si13734","si13749","si13760","si13771","si13782","si13850","si13862","si13874","si13820"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide13920"},"question":{"interactionId":"13695","quizId":379,"title":"Knowledge Check # 4\r","text":"Before you open an email message, respond to requests to click on links, or download attachments what can you do to confirm that the message is safe?\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":false,"correctAnswers":["d"]}}},{"id":"Image_29","class":"TODO::Senthil","instance":"Image_29","roles":{"click":{"subtype":"button","question":"Slide13672q17"},"textData":{}}},{"id":"si13474","class":"TODO::Senthil","instance":"Text_Caption_49","title":"Knowledge Check # 4 ","roles":{"textData":{}}},{"id":"si13486","class":"TODO::Senthil","instance":"Text_Caption_50","title":"If you experience any unsual problems with your computer, you should report it to ____. ","roles":{"textData":{}}},{"id":"si13497","class":"TODO::Senthil","instance":"Text_Caption_51","title":"a. ","roles":{"textData":{}}},{"id":"si13501","class":"TODO::Senthil","instance":"Text_Caption_52","title":"Help Desk ","roles":{"textData":{}}},{"id":"si13497_a","class":"TODO::Senthil","instance":"37","roles":{"answer":{"title":"Help Desk\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13508","class":"TODO::Senthil","instance":"Text_Caption_53","title":"b. ","roles":{"textData":{}}},{"id":"si13512","class":"TODO::Senthil","instance":"Text_Caption_54","title":"Your mother ","roles":{"textData":{}}},{"id":"si13508_a","class":"TODO::Senthil","instance":"39","roles":{"answer":{"title":"Your mother\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13519","class":"TODO::Senthil","instance":"Text_Caption_55","title":"c. ","roles":{"textData":{}}},{"id":"si13523","class":"TODO::Senthil","instance":"Text_Caption_56","title":"Your colleagues ","roles":{"textData":{}}},{"id":"si13519_a","class":"TODO::Senthil","instance":"41","roles":{"answer":{"title":"Your colleagues\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13530","class":"TODO::Senthil","instance":"Text_Caption_57","title":"d. ","roles":{"textData":{}}},{"id":"si13534","class":"TODO::Senthil","instance":"Text_Caption_58","title":"A teammate ","roles":{"textData":{}}},{"id":"si13530_a","class":"TODO::Senthil","instance":"43","roles":{"answer":{"title":"A teammate\r","index":"Not implemented","score":{"weight":0}}}},{"id":"si13602","class":"TODO::Senthil","instance":"Button_8","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13672q17","for":"Slide13672q17"},"textData":{}}},{"id":"si13614","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13672q17","for":"Slide13672q17"},"textData":{}}},{"id":"si13626","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13672q17","for":"Slide13672q17"},"textData":{}}},{"id":"si13572","class":"TODO::Senthil","instance":"SmartShape_22","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide13672q17"},"textData":{}}},{"id":"si13645","class":"TODO::Senthil","instance":"SmartShape_23","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide13672q17"},"textData":{}}},{"id":"si13658","class":"TODO::Senthil","instance":"SmartShape_24","title":"Correct Answer: Unusual computer problems should be reported to Help Desk. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide13672q17"},"textData":{}}},{"id":"Slide13672","class":"Question Slide","instance":"","thumbnail":"","children":["Image_29","si13474","si13486","si13501","si13512","si13523","si13534","si13602","si13614","si13626","si13572"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide13672"},"question":{"interactionId":"13447","quizId":379,"title":"Knowledge Check # 4\r","text":"If you experience any unsual problems with your computer, you should report it to ____.\r","ikc":true,"type":"knowledgeCheck","interactionType":"choice","ramdomized":true,"correctAnswers":["a"]}}},{"id":"Image_28","class":"TODO::Senthil","instance":"Image_28","roles":{"click":{"subtype":"button","question":"Slide13118q18"},"question":{"quizId":-1,"text":"Image ","type":"graded","interactionType":"choice","score":{"weight":1,"penalty":0}},"textData":{}}},{"id":"si13148","class":"TODO::Senthil","title":"Knowledge Check #4 ","roles":{"textData":{}}},{"id":"si13155","class":"TODO::Senthil","title":"Because third-party companies work with us, they don’t need to use the Guest access when they are onsite. ","roles":{"textData":{}}},{"id":"si13170","class":"TODO::Senthil","title":"a. ","roles":{"textData":{}}},{"id":"si13174","class":"TODO::Senthil","title":"True ","roles":{"textData":{}}},{"id":"si13170_a","class":"TODO::Senthil","roles":{"answer":{"title":"True","index":"Not implemented","score":{"weight":0}}}},{"id":"si13181","class":"TODO::Senthil","title":"b. ","roles":{"textData":{}}},{"id":"si13185","class":"TODO::Senthil","title":"False ","roles":{"textData":{}}},{"id":"si13181_a","class":"TODO::Senthil","roles":{"answer":{"title":"False","index":"Not implemented","score":{"weight":0}}}},{"id":"si13215","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13118q18","for":"Slide13118q18"},"textData":{}}},{"id":"si13232","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13118q18","for":"Slide13118q18"},"textData":{}}},{"id":"si13245","class":"TODO::Senthil","title":"Submit ","roles":{"click":{"subtype":"submit","question":"Slide13118q18","for":"Slide13118q18"},"textData":{}}},{"id":"si13189","class":"TODO::Senthil","title":"You must answer the question before continuing. ","roles":{"click":{"subtype":"button","question":"Slide13118q18"},"textData":{}}},{"id":"si13399","class":"TODO::Senthil","title":"Please try again ","roles":{"click":{"subtype":"button","question":"Slide13118q18"},"textData":{}}},{"id":"si13412","class":"TODO::Senthil","title":"Correct Answer: False, all visitors need to use a Guest account, as this restricts their access and limits our exposure to potenital threats. Click anywhere to continue ","roles":{"click":{"subtype":"button","question":"Slide13118q18"},"textData":{}}},{"id":"Slide13118","class":"Question Slide","instance":"","thumbnail":"","children":["Image_28","si13148","si13155","si13174","si13185","si13215","si13232","si13245","si13189"],"roles":{"slide":{"durationInFrames":90},"navigation":{"navid":"Slide13118"},"question":{"interactionId":"13135","quizId":379,"title":"Knowledge Check #4\r","text":"Because third-party companies work with us, they don’t need to use the Guest access when they are onsite.\r","ikc":true,"type":"knowledgeCheck","interactionType":"true-false","ramdomized":false,"correctAnswers":["b"]}}},{"id":"Slide7583","class":"PPTX Slide","instance":"End of Part 2","thumbnail":"","children":[],"roles":{"slide":{"durationInFrames":252},"navigation":{"navid":"Slide7583"}}},{"id":"Pool423","class":"pool","roles":{"pool":{"id":423,"name":"Pool1","questions":[]}}},{"id":"CyberSecurityDraft_Blue_Part2","class":"project","title":"CyberSecurityDraft_Blue_Part2","children":["Slide6047","Slide6063","Slide6079","Slide6095","Slide6111","Slide6127","Slide6143","Slide6159","Slide6175","Slide6191","Slide6207","Slide6223","Slide6239","Slide6255","Slide6271","Slide6287","Slide6303","Slide6319","Slide6335","Slide6351","Slide6367","Slide6383","Slide6399","Slide6415","Slide6431","Slide6447","Slide8470","Slide8609","Slide8331","Slide8192","Slide7914","Slide8053","Slide6559","Slide6575","Slide6591","Slide6607","Slide6623","Slide6639","Slide6655","Slide6671","Slide6687","Slide9251","Slide10547","Slide10329","Slide6767","Slide6783","Slide6799","Slide6815","Slide6831","Slide6847","Slide6879","Slide6895","Slide6911","Slide6927","Slide6943","Slide6959","Slide6975","Slide6991","Slide7007","Slide7023","Slide7039","Slide7183","Slide7055","Slide10965","Slide10548","Slide11800","Slide12342","Slide12561","Slide14168","Slide7199","Slide7215","Slide7231","Slide7247","Slide7263","Slide7279","Slide7295","Slide7311","Slide7343","Slide7359","Slide7375","Slide7391","Slide7407","Slide7423","Slide7439","Slide7455","Slide7471","Slide7487","Slide12562","Slide13920","Slide13672","Slide13118","Slide7583"],"roles":{"quiz":{"id":379,"branched":false,"submitAll":false,"review":true,"questions":["Slide8470q0","Slide8609q1","Slide8331q2","Slide8192q3","Slide7914q4","Slide8053q5","Slide9251q6","Slide10547q7","Slide10329q8","Slide10965q9","Slide10548q10","Slide11800q11","Slide12342q12","Slide12561q13","Slide14168q14","Slide12562q15","Slide13920q16","Slide13672q17","Slide13118q18"],"minScore":0,"maxScore":0,"passScore":0}}}],"contentSettings":{"global":{"branchAware":false},"toc":{"enabled":false},"playbar":{"enabled":true,"cc":true,"playPause":true,"back":true,"forward":true,"rewind":true,"close":true,"mute":true,"progressBar":true}},"contentReporting":{"CCCriteria":"viewPercent_or_quiz","CCData":{"viewDataIsPercent":true,"viewData":100,"quizData":"quiz_passed"},"SCCriteria":"viewPercent_or_quiz","SCData":{"viewDataIsPercent":true,"viewData":100,"quizData":"quiz_passed"},"exitNormalIfCompleted":false},"toc":[{"id":"Slide6047","title":"Cybersecurity","visible":true},{"id":"Slide6063","title":"Cybersecurity","visible":true},{"id":"Slide6079","title":"About the Course","visible":true},{"id":"Slide6095","title":"Purpose","visible":true},{"id":"Slide6111","title":"Cybersecurity Policy","visible":true},{"id":"Slide6127","title":"What is Non-Public Information?","visible":true},{"id":"Slide6143","title":"Business-related information that the unauthorized access to, disclosure of, or use would cause an adverse material impact to our business, operations, or security.","visible":true},{"id":"Slide6159","title":"Slide 8","visible":true},{"id":"Slide6175","title":"Personal identification information which can be used to identify an individual.","visible":true},{"id":"Slide6191","title":"Slide 10","visible":true},{"id":"Slide6207","title":"Protected health information (PHI), in any form or medium created by or derived from a health care provider or an individual and that relates to the past, present, or future health or condition of an individual or their family, provision of health care, or payment for provision of healthcare.","visible":true},{"id":"Slide6223","title":"Slide 12","visible":true},{"id":"Slide6239","title":"What is meant by network and system security?","visible":true},{"id":"Slide6255","title":"Network and System Security","visible":true},{"id":"Slide6271","title":"Network and System Security","visible":true},{"id":"Slide6287","title":"Network and System Security","visible":true},{"id":"Slide6303","title":"Slide 17","visible":true},{"id":"Slide6319","title":"Remote Access","visible":true},{"id":"Slide6335","title":"Non-Company Equipment","visible":true},{"id":"Slide6351","title":"Who Has Access?","visible":true},{"id":"Slide6367","title":"Device Management","visible":true},{"id":"Slide6383","title":"Slide 22","visible":true},{"id":"Slide6399","title":"User Responsibilities","visible":true},{"id":"Slide6415","title":"User Responsibilities","visible":true},{"id":"Slide6431","title":"Former Employees","visible":true},{"id":"Slide6447","title":"Self-Check","visible":true},{"id":"Slide8470","title":"Slide 27","visible":true},{"id":"Slide8609","title":"Slide 28","visible":true},{"id":"Slide8331","title":"Slide 29","visible":true},{"id":"Slide8192","title":"Slide 30","visible":true},{"id":"Slide7914","title":"Slide 31","visible":true},{"id":"Slide8053","title":"Slide 32","visible":true},{"id":"Slide6559","title":"Data Control & Access","visible":true},{"id":"Slide6575","title":"Data Control and Access","visible":true},{"id":"Slide6591","title":"Internal Control and Access","visible":true},{"id":"Slide6607","title":"Internal Control and Access","visible":true},{"id":"Slide6623","title":"Slide 37","visible":true},{"id":"Slide6639","title":"Internal Control and Access","visible":true},{"id":"Slide6655","title":"Slide 39","visible":true},{"id":"Slide6671","title":"Disaster Recovery & Business Continuity","visible":true},{"id":"Slide6687","title":"Self-Check","visible":true},{"id":"Slide9251","title":"Slide 42","visible":true},{"id":"Slide10547","title":"Slide 43","visible":true},{"id":"Slide10329","title":"Slide 44","visible":true},{"id":"Slide6767","title":"Learner Activity","visible":true},{"id":"Slide6783","title":"Employee Responsibilities & Best Practices","visible":true},{"id":"Slide6799","title":"Never underestimate your importance to cybersecurity.","visible":true},{"id":"Slide6815","title":"Slide 49","visible":true},{"id":"Slide6831","title":"Laptop Usage","visible":true},{"id":"Slide6847","title":"Reviewing Your Responsibilities","visible":true},{"id":"Slide6879","title":"Best Practices – Wi-Fi","visible":true},{"id":"Slide6895","title":"Best Practices - Passwords","visible":true},{"id":"Slide6911","title":"Best Practices - Passwords","visible":true},{"id":"Slide6927","title":"Password Hints","visible":true},{"id":"Slide6943","title":"Password Security","visible":true},{"id":"Slide6959","title":"Mobile Device Usage","visible":true},{"id":"Slide6975","title":"Reviewing Your Responsibilities","visible":true},{"id":"Slide6991","title":"Personal Owned Devices Policy","visible":true},{"id":"Slide7007","title":"Best Practices – Personal Devices","visible":true},{"id":"Slide7023","title":"Internet Usage","visible":true},{"id":"Slide7039","title":"Best Practices – Internet Usage","visible":true},{"id":"Slide7183","title":"Best Practices","visible":true},{"id":"Slide7055","title":"Self-Check","visible":true},{"id":"Slide10965","title":"Slide 66","visible":true},{"id":"Slide10548","title":"Slide 67","visible":true},{"id":"Slide11800","title":"Slide 68","visible":true},{"id":"Slide12342","title":"Slide 69","visible":true},{"id":"Slide12561","title":"Slide 70","visible":true},{"id":"Slide14168","title":"Slide 71","visible":true},{"id":"Slide7199","title":"Email Usage","visible":true},{"id":"Slide7215","title":"Slide 73","visible":true},{"id":"Slide7231","title":"Email Usage","visible":true},{"id":"Slide7247","title":"Best Practices - Email","visible":true},{"id":"Slide7263","title":"Best Practices - Email","visible":true},{"id":"Slide7279","title":"Encryption","visible":true},{"id":"Slide7295","title":"Protecting Company & Client Data","visible":true},{"id":"Slide7311","title":"Reviewing Your Responsibilities","visible":true},{"id":"Slide7343","title":"Best Practices – Hard Copies","visible":true},{"id":"Slide7359","title":"Best Practices – Verbal Communication","visible":true},{"id":"Slide7375","title":"Recognizing Threats","visible":true},{"id":"Slide7391","title":"Phishing Attacks","visible":true},{"id":"Slide7407","title":"Slide 85","visible":true},{"id":"Slide7423","title":"Phishing Examples","visible":true},{"id":"Slide7439","title":"Symptoms of Cybersecurity Events","visible":true},{"id":"Slide7455","title":"Reporting Threats","visible":true},{"id":"Slide7471","title":"New Threats","visible":true},{"id":"Slide7487","title":"Self-Check","visible":true},{"id":"Slide12562","title":"Slide 91","visible":true},{"id":"Slide13920","title":"Slide 92","visible":true},{"id":"Slide13672","title":"Slide 93","visible":true},{"id":"Slide13118","title":"Slide 94","visible":true},{"id":"Slide7583","title":"End of Part 2","visible":true}]}