Open Government Portal

Found 10 records similar to CCNSS Bulletin Edition 1 | March 2018

Federal

"In This Edition

Recent Approval of Two New Standards
Recent Discussion on Physical Security
Future Meeting Agendas September and December
Contact Us

"

Last Updated: Dec. 12, 2019
Date Published: Jun. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  CCNSS
Federal

"In This Edition

CSE at GTEC 2016
Quantum Computing and the Security of Public Key Cryptography
Leveraging Blockchain for the Government of Canada
Mobile Security: Using GC Mobile Devices on Public Networks can be Risky
IT Security Learning Centre News
About this Newsletter
Subscribe
Contact Us

"

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2016
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility, Wireless
Federal

"
Introduction: Why this guide is important to your campaign planning
Before we start… Something for everyone
Step 1: Assess what cyber security means for your campaign
Step 2: Understand where your data lives
Step 3: Secure your data and technology
Step 4: Provide cyber security training
Step 5: Know what to dispose of or archive
What to do when things go wrong
Additional resources
"

Last Updated: Dec. 12, 2019
Date Published: Jun. 17, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  campaign, election, candidates, cyber security
Federal

"In our highly connected digital society, Canadians and Canadian organizations rely on the Internet for both personal and professional activities. It is in this context that we assess cyber threats to Canadian individuals, businesses, and critical infrastructure, including government.

Cyber threat activity against Canadians often has financial or privacy implications. Yet cyber threat activity against Canadian businesses and critical infrastructure can have more far-reaching consequences, such as operational disruptions to the financial sector, large-scale theft of personal information, and even potential damage to infrastructure."

Last Updated: Dec. 12, 2019
Date Published: Dec. 6, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Threat Assessment
Federal

"

A compromise of your social media or email account has serious implications. If you think your email or social media accounts have been breached, you should follow the steps below and contact your IT security officer. Depending on the nature of the suspected compromise, your IT security officer could be with the HoC. It could also be your DSO or your political party CIO.

Last Updated: Dec. 12, 2019
Date Published: Aug. 13, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Learning, Your Privacy Online
Federal

The following content was created prior to the creation of the Canadian Centre for Cyber Security by one of the entities that became part of the Cyber Centre. This content remains relevant to current discussions about cyber security.

Last Updated: Dec. 12, 2019
Date Published: Sep. 25, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  CSE Archive, Infographics, Mobility, Wireless, Voice and Telephony, Social Media
Federal

The following content was created prior to the creation of the Canadian Centre for Cyber Security by one of the entities that became part of the Cyber Centre. This content remains relevant to current discussions about cyber security.

Last Updated: Dec. 12, 2019
Date Published: Aug. 25, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  CSE Archive, Infographics
Federal

This document describes common concepts relevant to discussions about cyber threat activity in the Canadian context and acts as a point of reference for Canadian Centre for Cyber Security (Cyber Centre) publications. This introductory document provides baseline knowledge about the cyber threat environment, including cyber threat actors and their motivations, sophistication, techniques, tools, and the cyber threat surface.

Last Updated: Dec. 12, 2019
Date Published: Nov. 24, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber security
Federal

"Mobile devices are important business tools that help government employees communicate and perform their duties in an effective and timely manner. Mobile devices use a microphone for voice communication, recording and voice commands. When the microphone is on, the information being discussed could be at risk. Threat actors can install malicious software (malware) which enables them to turn on the microphone remotely.

Last Updated: Sep. 25, 2020
Date Published: Apr. 1, 2017
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Wireless
Federal

Government of Canada (GC) departments rely on information systems to support their business activities. These interconnected information systems are often subject to serious threats which can have adverse effects on departmental business activities by compromising the confidentiality, integrity or availability of the systems and their information technology (IT) assets. Senior management support is essential in ensuring the continued protection of business applications, information assets, and IT infrastructures. This bulletin identifies key questions to guide leadership discussions between management and their IT security team to enhance national security, protect sensitive GC information and enable the achievement of departmental mission objectives.

Last Updated: Dec. 12, 2019
Date Published: Sep. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Network Security, Risk Management
Date modified: