Open Government Portal
Found 10 records similar to Secure Communications Interoperability Protocol (SCIP) Rekey Guides (ITSB-46)
The following general rules and procedures pertaining to SCIP End Crypto Unit (ECU) rekey must be complied with to ensure successful rekey.
The purpose of this bulletin is to advise the Government of Canada (GC) that the Canadian Central Facility (CCF) now has the capability to provide foreign Secure Communications Interoperability Protocol (SCIP) Seed key in electronic form.
The purpose of this bulletin is to inform the Government of Canada (GC) of the Communications Security Establishment Canada's (CSEC) guidance regarding the use of commercial technologies to safeguard the communications of classified information at the level of SECRET within a departmental local enclave.
This bulletin aims to describe the risks posed by, and possible mitigations for, the exposure of classified IT systems to wireless signals and mobile devices that are not authorized to connect to those systems. The intended audience for this bulletin includes those responsible for IT security risk management activities as well as information system security practitioners.
This bulletin is in support of the Treasury Board of Canada Secretariat (TBS) Information Technology Policy Implementation Notice 2014-01 (ITPIN: 2014-01). The notice, released in May 2014, describes the risks posed by, and the possible mitigations for, removable media devices that are used to temporarily store GC information. The intended audience for this bulletin includes executives, those responsible for IT security risk management activities, and information system security practitioners.
The purpose of this Bulletin is to advise Government of Canada (GC) departments and agencies of the security threat posed by modern "keylogger" software with enhanced data capture capabilities which utilize "stealth" techniques to hide from anti-virus and anti-spyware scanners.
This bulletin is intended for information security practitioners responsible for IT security risk management activities and is structured to be used within the framework of Information Technology Security (ITS) management activities defined within the publication: CSEC - IT Security Risk Management: A Lifecycle Approach (ITSG-33).
Government of Canada (GC) departments rely on information systems to support their business activities. These interconnected information systems are often subject to serious threats which can have adverse effects on departmental business activities by compromising the confidentiality, integrity or availability of the systems and their information technology (IT) assets. Senior management support is essential in ensuring the continued protection of business applications, information assets, and IT infrastructures. This bulletin identifies key questions to guide leadership discussions between management and their IT security team to enhance national security, protect sensitive GC information and enable the achievement of departmental mission objectives.
Interoperability within the agricultural implements industry is part of interconnected public policy issues that have arisen because of new market dynamics created by digital technologies. Western Canadian implement manufacturers have identified a major business challenge from the accelerated lock down of software on combines and tractors, which make implement brands incompatible, or inoperable, with original equipment manufacturers' systems. This report looks at the economic significance of agricultural manufacturing in western Canada with additional insight from industry on the effects of a single change to interoperability on agriculture machinery.
This document summarizes the steps required to enable release of COMSEC material to the private sector and is based on the CSE Directive for the Control of COMSEC Material in the Canadian Private Sector (ITSD-06A).