Open Government Portal

Found 10 records similar to Biometrics (ITSAP.00.019)

Federal

Online banking offers you the convenience of accessing your financial information through a mobile device or a computer. Although your online banking services should be secure (e.g. using authentication and encryption), there are risks related to the possibility that threat actors can find ways to access your sensitive information. This document includes some tips on how you can protect your sensitive financial information while using online banking services.

Last Updated: Dec. 23, 2020
Date Published: Sep. 10, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Identity and Passwords, Risk Management, Your Privacy Online
Federal

Organizations and individuals can benefit from using multi-factor authentication (MFA) to secure devices and accounts. With MFA enabled, two or more different authentication factors are needed to unlock a device or sign in to an account. Whether accessing email, cloud storage, or online banking services, MFA provides an extra layer of security from cyber attacks like credential stuffing. In credential stuffing, hackers use previously stolen credentials from one website, hoping that you have reused these credentials.

Last Updated: Dec. 23, 2020
Date Published: Jun. 25, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this potential, it is imperative that we address the security and privacy dimensions of cloud computing. Cryptography is one of the main pillars enabling security and privacy in cloud computing. It plays an essential role in enabling cloud services such as authentication, secure access to cloud workloads, secure data storage, and secure data exchange.

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cryptography, Cyber Defence, Network Security, Risk Management
Federal

Maybe you try opening files, only to be denied access. Perhaps your device is running slower. Maybe you notice other abnormal behaviour from your computer or device. There could be perfectly reasonable explanations for these issues, like you’re using old hardware, you don’t have enough RAM, or your disk is full.

Last Updated: Dec. 23, 2020
Date Published: Jun. 23, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Network Security, Virus, Your Privacy Online
Federal

When people from around the world apply for a visitor visa, study or work permit, or permanent residence, they need to give their fingerprints and a photo, known as biometrics. Just recently, the Government of Canada (GC) made it easier for foreign nationals to provide biometrics when applying from within Canada to extend or renew their visitor visa or work or study permit. What happens after people give their biometrics? How does the data get stored and shared among the different GC departments that play a role in this process?

Last Updated: Jun. 10, 2021
Date Published: Mar. 2, 2020
Organization: Shared Services Canada
Formats: HTML
Keywords:  Shared Services Canada, Biometrics, Information Technology (IT), 2020
Federal

Threat actors can use malware, or malicious software, to infiltrate or damage networks, systems, and devices. Once malware is installed on your organization’s systems and devices, threat actors can gain access to sensitive information. This document introduces some common types of malware, tips for detecting whether your devices have been infected, and steps to protect your organization from being compromised by malware.

Last Updated: Dec. 23, 2020
Date Published: Jan. 10, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Learning, Mobility, Remote Access, Wireless, Network Security, Risk Management, Virus, Your Privacy Online
Federal

Having a backup (a copy) of your organization’s information is one step that you can take to improve your cyber security and your resiliency as a business. If your networks, systems, or information are compromised by a threat, such as a virus, or damaged due to a natural disaster, a backup helps your organization minimize downtime and get back to business quickly.

Last Updated: Dec. 23, 2020
Date Published: Oct. 1, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Risk Management
Federal

As a research organization, you rely on your ability to continuously innovate, develop, and improve. Your research data and intellectual property are high-value targets for cyber threat actors, and a successful cyber attack can prevent you from carrying out your work and jeopardize your data. To protect your research environment and data, your organization should understand common cyber security threats and implement some basic security measures.

Last Updated: Dec. 23, 2020
Date Published: Sep. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Identity and Passwords, Remote Access, Wireless, Network Security, Risk Management
Federal

Peripheral devices are devices that you connect to and use with a host computer or mobile device. You can use peripherals to enhance the capabilities of a computer or mobile device and improve your user experience. However, these devices can provide threat actors with another means to compromise your organization’s networks, systems, and information.

Last Updated: Dec. 23, 2020
Date Published: Oct. 13, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility, Wireless
Federal

Online shopping is convenient; you can purchase items through your mobile device and get next-day delivery to your front door. However, you should be aware of the threats associated with online shopping. These threats pose many risks to not only your personal information, but your organization’s assets (e.g. email address, shipping address, phone number, credit card).

Last Updated: Dec. 23, 2020
Date Published: Nov. 28, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Supply Chain Security, Your Privacy Online
Date modified: