Open Government Portal

Found 10 records similar to Guidance on Securely Configuring Network Protocols (ITSP.40.062)

Federal

The information in this publication identifies and describes approved cryptographic algorithms and appropriate methods of use to protect the confidentiality of PROTECTED A and PROTECTED B information and the integrity of information to the medium injury level as defined in CSE’s ITSG-33 IT Security Risk Management: A Lifecycle Approach [6].

Last Updated: Dec. 12, 2019
Date Published: Aug. 2, 2016
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cryptography
Federal

IT Security is essential to government and commercial business activities in Canada. Public Key Cryptography (PKC) is used to protect the confidentiality and integrity of information and is robust in today’s computer environment. However, a new computer technology, quantum computing, promises a significant increase in computational capabilities that could compromise PKC.

Last Updated: Dec. 12, 2019
Date Published: May 1, 2017
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cryptography, Risk Management
Federal

This document provides guidance for deploying Microsoft Windows 7 Enterprise Edition operating system (OS) (i.e., Windows 7) in a manner that will best prevent compromise of Government of Canada (GC) IT assets and infrastructures in a generic internet-facing Protected B environment. It is intended for use by information system practitioners, security practitioners, and security assessment and authorization authorities who are collectively responsible for departmental networking risk management.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2014
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Operating Systems and Applications
Federal

Small and medium organizations have valuable information (e.g. sensitive business, employee, and client information) that needs to be protected to ensure business activities run smoothly. Small and medium organizations are likely targets of cyber attacks because these organizations often lack resources to put towards cyber security. While it may not be possible to protect everything, knowing what information is valuable to your organization can help you protect what matters most.

Last Updated: Dec. 12, 2019
Date Published: Apr. 30, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Risk Management, Your Privacy Online
Federal

Calculating Robustness for Boundary Controls is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security Establishment (CSE). Suggestions for amendments should be forwarded to the Canadian Centre for Cyber Security’s (CCCS) Contact Centre.

Last Updated: Dec. 12, 2019
Date Published: Mar. 20, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security
Federal

ITSP.70.012 Guidance for Hardening Microsoft Windows 10 Enterprise is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security Establishment (CSE). Suggestions for amendments should be forwarded to the Canadian Centre for Cyber Security’s Contact Centre.

Last Updated: Dec. 12, 2019
Date Published: Mar. 20, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Operating Systems and Applications
Federal

Information Technology Security Guidance for Practitioners ITSP.30.031 V3 supersedes ITSP.30.031 V2 User Authentication Guidance for IT Systems and provides guidance on user authentication in IT systems. ITSP.30.031 V3 is also part of a suite of documents developed by CSE to help secure GC departmental networks. User authentication is imperative in keeping cyber threat actors out of departmental systems, and the security controls used to protect GC systems are critical elements in the design of IT infrastructure.

Last Updated: Dec. 12, 2019
Date Published: Apr. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Identity and Passwords
Federal

Obtaining the right information at the right time in the right place is critical for organizations to carry out their day-to-day business. This requirement must be balanced with the appropriate information protection measures. Historically, organizations’ information has been protected by separating networks having different levels of information. However, this separation makes it difficult to share information.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2017
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security
Federal

This bulletin provides information on the availability of the Secure Communications Interoperability Protocol (SCIP) rekey guides.

Last Updated: Dec. 12, 2019
Date Published: Feb. 1, 2008
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  COMSEC
Federal

The Baseline Cyber Security Controls for Small and Medium Organizations is an UNCLASSIFIED publication intended for small and medium organizations in Canada that want recommendations to improve their resiliency via cyber security investments. This document is for the public and as such has the Traffic Light Protocol (TLP) marking [1]Footnote 1 of TLP:WHITE.

Last Updated: Sep. 25, 2020
Date Published: Sep. 13, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cyber Defence, Identity and Passwords, Learning, Media Sanitization, Mobility, Network Security, Risk Management
Date modified: