Search Records

159 datasets found
  • Open Information

    Developing your incident response plan (ITSAP.40.003)

    Your incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents. Cyber threats, natural disasters, and unplanned outages are examples of incidents that will impact your network, systems, and...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Using encryption to keep your sensitive data secure - ITSAP.40.016

    Encryption technologies are used to secure many applications and websites that you use daily. For example, online banking or shopping, email applications, and secure instant messaging use encryption. Encryption technologies secure information while it is in transit (e.g. connecting to a website)...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Internet of Things (IoT) Security - ITSAP.00.012

    The Internet of Things (IoT) refers to the network of everyday web-enabled objects that can connect and exchange information. These “smart” objects include more than your computer, smartphone, or tablet. They include items like personal fitness trackers, TVs, thermostats, or cars. This list of...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Harmonized TRA Methodology (TRA-1)

    " TRA-1 - Tool TRA-1 - A-5: Sample Statement of Work for TRA Consulting Services TRA-1 - A-6: Sample TRA Work Plan TRA-1 - B-2: Asset Listing TRA-1 - B-5: Asset Valuation Table / Statement of Sensitivity TRA-1 - C-2: Threat Listing TRA-1 - C-4: Threat Assessment Table...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber security guide for campaign teams

    " Introduction: Why this guide is important to your campaign planning Before we start… Something for everyone Step 1: Assess what cyber security means for your campaign Step 2: Understand where your data lives Step 3: Secure your data and technology Step 4: Provide cyber...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Five practical ways to make yourself cybersafe

    Canadians are targets of cybercrime in many different forms. Here are five practical measures you can take right now on any device to protect yourself against cyber-security breaches. Visit www.cyber.gc.ca for more on any of these steps.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Five practical ways to protect your campaign

    As a kickstart to your cyber security planning, here are five practical measures you can take right now to make your campaign more secure. Visit www.cyber.gc.ca for more on any of these steps.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Loss of control of social media channels

    The results of an account compromise can be devastating. If one of your social media accounts are compromised, do the following things: take action, assess and contain, and protect.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
You can also access this registry using the API (see API Docs).