Communications Security Establishment Canada

146 datasets found
  • Open Information

    Security considerations for your website (ITSM.60.005)

    This document introduces cyber security best practices that your organization should integrate into the design and maintenance of its website. In Section 2, we include a checklist of key measures that your IT decision makers and web development team managers can implement to improve the security...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Security considerations for electronic poll book systems (ITSM.10.101)

    This document provides guidance on cyber security considerations required to securely design, deploy, and operate electronic poll book systems. The document highlights traditional poll book functions and discusses new services that can be integrated to support modern elections. It also provides...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber threat bulletin: The ransomware threat in 2021

    This cyber threat bulletin provides an update to Canadians about the threat from ransomware in Canada and how we expect that threat to evolve over the next year.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber threat bulletin: Cyber threat to operational technology

    Table of contents Introduction The digital dransformation of OT OT cybersecurity vs. IT cybersecurity OT exposure in Canada: A snapshot The OT of the future: Cyber-physical systems The role of OT in critical infrastructure The cyber threat to OT Direct vs indirect...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Ransomware playbook (ITSM.00.099)

    The information provided in this document is intended to inform and assist organizations with drawing down the risks, reducing impacts, and taking preventative actions associated with ransomware attacks. You can use the considerations below to articulate your business and security requirements...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Post-secondary cyber security related programs

    The intent of this guide is not to recommend any schools or programs, but to provide a listing of available programs that may help advance an individual’s career in the field of cyber security.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    National Cyber Threat Assessment 2023-2024

    This document highlights the cyber threats facing individuals and organizations in Canada. It provides an update to the National Cyber Threat Assessment 2018 (NCTA 2018) and the National Cyber Threat Assessment 2020 (NCTA 2020), with analysis of the interim years and forecasts until 2024. We...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber threats to Canada's democratic process : July 2021 update

    This document provides an update to the 2017 Cyber threats to Canada’s democratic process reports and 2019 Cyber threats to Canada’s democratic process reports released by CSE. Its purpose is to inform Canadians about cyber threats to the democratic process.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Data

    2021-2022 Canadian Centre for Cyber Security - Learning Hub Statistics

    This dataset provides an overview of the courses offered by the Canadian Centre for Cyber Security, the duration, course fee, number of sessions offered, and total number of participants for the given fiscal year.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • CSV
  • Open Information

    Certifications in the field of cyber security

    The guide provides information about many of the certifications available for prospective students and cyber security professionals. The intent is not to recommend any certification body or certification in particular, but to provide a listing of some of the different certifications that may help...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber security career guide

    On this page Types of careers Who is hiring? Career pathways Cyber security education
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Guidance on using tokenization for cloud-based services (ITSP.50.108)

    This document describes how your organization can use tokenization to reduce the residual risks incurred when using cloud based services to transmit, process, or store sensitive information (i.e. information that requires protection against unauthorized disclosure). When using cloud-based...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    How to identify misinformation, disinformation, and malinformation (ITSAP.00....

    The effects of misinformation, disinformation, and malinformation (MDM) cost the global economy billions of dollars each year. Often known colloquially as “fake news”, MDM are damaging to public trust in institutions and, during elections, may even pose a threat to democracy itself. MDM has...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Securing access controls in a volunteer-based organization (ITSM.30.010)

    This document outlines common risks faced by volunteer-based organizations and recommends how to address these risks by adapting how people, processes, information, and technologies are managed. This document is intended for cyber security program owners, managers, and cyber security practitioners.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Digital footprint (ITSAP.00.133)

    Your organization uses the Internet to carry out business activities, provide employees with remote work capabilities, and offer services to clients. As your employees and partners carry out activities on different online platforms and applications, consider the digital footprint they leave...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Implementation guidance: email domain protection (ITSP.40.065 v1.1)

    This document provides guidance to system owners on implementing technical security measures to protect their domains from email spoofing. In this document, we describe technical measures that system owners can implement to prevent the delivery of certain malicious messages that are abusing the...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Security considerations for industrial control systems (ITSAP.00.050)

    An industrial control system (ICS) automates and controls industrial processes (e.g. manufacturing, product handling, production, and distribution) and mechanical functions to keep processes and machinery running smoothly. An ICS may support critical infrastructure (e.g. energy and utilities,...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Developing your incident response plan (ITSAP.40.003)

    Your incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents. Cyber threats, natural disasters, and unplanned outages are examples of incidents that will impact your network, systems, and...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Using encryption to keep your sensitive data secure - ITSAP.40.016

    Encryption technologies are used to secure many applications and websites that you use daily. For example, online banking or shopping, email applications, and secure instant messaging use encryption. Encryption technologies secure information while it is in transit (e.g. connecting to a website)...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML