Changes

Jump to navigation Jump to search
Created page with " <div class="center"> {| class="FCK__ShowTableBorders" style="border: 2px solid rgb(110, 110, 110);" width="1000" |- ! style="background: rgb(248, 224, 224); color: black;" wi..."

<div class="center">
{| class="FCK__ShowTableBorders" style="border: 2px solid rgb(110, 110, 110);" width="1000"
|-
! style="background: rgb(248, 224, 224); color: black;" width="16%" scope="col" | [[GC Cyber Security Event Management|Overview]]
! style="background: rgb(248, 224, 224); color: black;" width="16%" scope="col" | [[GC Cyber Security Event Management Documentation|Documentation]]
! style="background: rgb(248, 224, 224); color: black;" width="25%" scope="col" | [[GC Cyber Security Event Management Tools and Templates|Tools, Templates, and Reference Materials]]
! style="background: rgb(247, 129, 129); color: black;" width="16%" scope="col" | [[GC Cyber Security Event Management CCCS Products|CCCS Products]]
! style="background: rgb(248, 224, 224); color: black;" width="16%" scope="col" | [[GC Cyber Security Event Management Contact Information|Contact Information]]
! style="background: rgb(248, 224, 224); color: black;" width="16%" scope="col" | [[GC Cyber Security Event Management Glossary|Glossary]]
|}
</div>


{{TOCright}}

== The Canadian Centre for Cyber Security ==

== Operational Publications ==

{| class="wikitable" border="1"
|+ Operational Publications
|-
!Title
!Threat Rating
!Audience
!Frequency
!Triggers
!Description
|-
|Cyber Flash
|High
|IT Sec Ops
|Adhoc
|High threats affecting GC infrastructure
|Cyber Flashes are extremely time sensitive and describe an immediate or active security issue.
|-
|Alert
|Medium/Elevated
|IT Sec Ops
|Adhoc
|Elevated threats with potential to affect GC infrastructure
|Alerts are used to raise awareness of a recently identified cyber threat that may impact GC IM/IT assets.
|-
|Advisory
|Low
|IT Sec Ops
|Adhoc
|Vulnerabilities affecting GC infrastructure. No known or low threat(s).
|Advisories are used to communicate information about vulnerabilities and security updates to software, specifically to flaws in software design, use or implementation. These vulnerabilities could be leveraged to possibly impact GC IM/IT assets, information or infrastructure.
|-
|Cyber Brief
|Low
|IT Sec Ops
|Semi-Weekly
|Pooled cyber intelligence and research, e.g., news, indicators of compromise, threats and campaigns.
|The information contained in these briefs is based on research and response activities undertaken by the SOC, cyber partners, and external subject matter experts. It includes indicators of compromise (IOC), cyber news and cyber threat intelligence.
|}

== Informational Publications ==

{| class="wikitable" border="1"
|+ Informational Publications
|-
!Title
!Threat Rating
!Audience
!Frequency
!Triggers
!Description
|-
|Information Note
|N/A
|IT Sec Ops
|Adhoc
|Administrative changes
|Information Notes are used to explain or draw attention to changes in CCCS policy or procedures.
|-
|Technical Note
|N/A
|IT Sec Ops
|Adhoc
|In-Depth research paper
|A Technical Report is a detailed report that explains the technical aspects related to a cyber event or malware behavior that may have impacted government networks.
|}

== Reports ==

{| class="wikitable" border="1"
|+Reports
|-
!Title
!Threat Rating
!Audience
!Frequency
!Triggers
!Description
|-
|Quarterly Reports
|N/A
|SOC Management, Treasury Board Secretariat
|End of Each Quarter
|Roll-up Report
|A detailed report that examines the incidents, threats, vulnerabilities, malware and campaigns tracked and responded to by the SOC in the previous quarter.
|}

Navigation menu

GCwiki