-
Catalogue Entry: Private networks - Get Cyber Safe 2021
Help keep your devices and your data safe from potential intruders.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Emission Security (EMSEC) Guidance (ITSG-11A)
"The COMSEC Installation Planning – Guidance and Criteria (ITSG-11) has been superseded by Emission Security (EMSEC) Guidance (ITSG-11A) February 2016 which is a Protected...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Protect how you connect
Assessing possible risk before using social media platforms and apps-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Cyber Security Advice for Political Candidates
"The Canadian Centre for Cyber Security has warned that foreign actors will likely try to interfere in Canadian election processes. If you’re involved in politics – as a...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Identify and handle malicious messages
All members of a campaign team should know how to identify malicious messages and how to handle them.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Loss of control of social media channels
The results of an account compromise can be devastating. If one of your social media accounts are compromised, do the following things: take action, assess and contain, and...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Five practical ways to protect your campaign
As a kickstart to your cyber security planning, here are five practical measures you can take right now to make your campaign more secure. Visit www.cyber.gc.ca for more on any...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Five practical ways to make yourself cybersafe
Canadians are targets of cybercrime in many different forms. Here are five practical measures you can take right now on any device to protect yourself against cyber-security...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Cyber security guide for campaign teams
" Introduction: Why this guide is important to your campaign planning Before we start… Something for everyone Step 1: Assess what cyber security means for your campaign Step 2:...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Baseline security requirements for network security zones (version 2.0) - ITSP.80.022
This Guidance document is intended to outlines network security zone models and architectures and provides technical guidance on implementing network security zones.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Harmonized TRA Methodology (TRA-1)
" TRA-1 - Tool TRA-1 - A-5: Sample Statement of Work for TRA Consulting Services TRA-1 - A-6: Sample TRA Work Plan TRA-1 - B-2: Asset Listing TRA-1 - B-5: Asset Valuation Table...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Communications Security Establishment Annual Report 2019-2020
"The Communications Security Establishment (CSE) released its first unclassified, public Annual Report. This past year has been a notable one for CSE, highlighted by the CSE Act...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Internet of Things (IoT) Security - ITSAP.00.012
The Internet of Things (IoT) refers to the network of everyday web-enabled objects that can connect and exchange information. These “smart” objects include more than your...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: What are the most common forms of phishing? An overview - Get Cyber Safe 2021
A quick overview of the most common types of phishing campaigns that cyber criminals use to steal your information.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Annual Report to Parliament on the Administration of the Access to...
This is the ninth annual report prepared by the Communications Security Establishment (CSE) and tabled in Parliament in accordance with section 94 of the Access to Information...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Communications Security Establishment Accessibility Plan 2022–2025
This plan supports our goal of building a skilled and diverse workforce reflective of Canadian society. It showcases the work that has already started at CSE towards identifying...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Using encryption to keep your sensitive data secure - ITSAP.40.016
Encryption technologies are used to secure many applications and websites that you use daily. For example, online banking or shopping, email applications, and secure instant...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Developing your incident response plan (ITSAP.40.003)
Your incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents. Cyber...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Security considerations for industrial control systems (ITSAP.00.050)
An industrial control system (ICS) automates and controls industrial processes (e.g. manufacturing, product handling, production, and distribution) and mechanical functions to...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Implementation guidance: email domain protection (ITSP.40.065 v1.1)
This document provides guidance to system owners on implementing technical security measures to protect their domains from email spoofing. In this document, we describe...-
File available for download in the following formats:
- HTML