Search Records

23 datasets found
  • Open Information

    Guidance on Cloud Security Assessment and Authorization (ITSP.50.105)

    "Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your organization must ensure that security risks are properly managed, cloud specific security considerations are addressed, and...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
    • PDF
  • Open Information

    Security Considerations for Exposure of Classified IT Systems to Mobile Devic...

    This bulletin aims to describe the risks posed by, and possible mitigations for, the exposure of classified IT systems to wireless signals and mobile devices that are not authorized to connect to those systems. The intended audience for this bulletin includes those responsible for IT security...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
    • PDF
  • Open Information

    Cyber Security Guidance for Elections Authorities (ITSM.10.020)

    "This document is intended for elections authorities. It introduces common threats to Canada’s electoral processes and provides guidance on protecting the systems and the people involved in these processes. The guidance in this document is based on information gathered from various sources and is...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
    • PDF
  • Open Information

    Cyber Threats To Canada's Democratic Process

    The recent cyber threat activity against the democratic process in the United States and Europe has raised concerns about similar threats to Canada. In this assessment, we consider the cyber threats to Canada’s democratic process at the federal, provincial/territorial, and municipal levels of...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Continuing to Advance Our IT Security Goals

    o Canadian Medium Assurance Solutions o Shared Services Canada’s Security Operations Centre o CSE’s Top 10 and Shared Services Canada o CSE’s Top 10 in the Mobile Environment
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Building a Strong Foundation for the GC

    o Social Media Security Pitfalls o Success of your Departmental Mission o Anatomy of a Cyber Intrusion o Securing BlackBerry Devices o Using Wi-Fi While Travelling
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Building a Resilient Network

    o Interview: Why the Top 10? o Denial of Service o Mobility Security o Cyber Security Awareness Month o Zero-Day Exploits o Disposition of Windows XP o Cross Domain Solutions
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    The Changing Nature of How We Work

    o Web 2.0 Security Risks o Data Diodes in a Cross-Domain Solution o The Importance of a Departmental TA o Two-Factor Authentication o Cloud Computing
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Keeping our Information Secure

    o Instant Messaging Security Risks o Spotting Malicious Emails o GC CIRT Pointer: Exploit Kits o Securing your GC SECRET Network o Sharing Information across Different Security Domains o VoIP for GC Departments o TBS Corner: Web 2.0 and the GC o...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
You can also access this registry using the API (see API Docs).