Search results

Jump to navigation Jump to search
  • ...e:230420 - LCCP CUB.odp|This]] is the test of this platform for sharing of protected A documents.
    103 bytes (18 words) - 14:30, 23 April 2020
  • ...tion-itsp40111 Cryptographic Algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B Information]
    3 KB (364 words) - 09:00, 21 August 2020
  • There are different docs for Protected A or B. Complete docs as per your rating. The below is taken from the TC on ###For Systems rated Unclassified and Protected A:
    6 KB (885 words) - 11:11, 12 February 2019
  • For Protected A Data, it can reside outside of Canada, provided the country is listed in
    2 KB (322 words) - 15:31, 24 July 2020
  • ...PSPC #TranslationBureau’s new #GClingua solution? #GClingua is hosted on a Protected B cloud that is accessible from anywhere, which will allow for easy and sec ...sy-to-access interface, a secure environment that supports Protected A and Protected B documents, and many features designed to simplify request processing. Tra
    10 KB (1,403 words) - 15:24, 25 March 2022
  • '''Step 1: IT Infrastructure/Protected B cloud environment''' ...liverables for the project are highly dependent on successfully securing a protected B cloud environment.
    7 KB (1,005 words) - 10:50, 10 January 2022
  • ...pace with digital revolution and to help protect and enable visibility of PROTECTED B information transmitted to and from public cloud service. The implementation of SCED project will enable the use of PROTECTED B cloud.
    12 KB (1,788 words) - 12:16, 23 June 2023
  • ...mine any breaches of information and make sure confidential information is protected. In addition, the GC educates its employees on DLP strategies that they sho ...value for SSC. Much of the information SSC has access to is classified as protected. As such, SSC should take any measure possible to protect and monitor this
    6 KB (859 words) - 14:04, 25 October 2018
  • ...D C, CONFIDENTIAL, SECRET, TOP SECRET) cannot be deployed to public Cloud. Protected B and unclassified data are deemed appropriate for public Cloud deployment, '''Q:''' How is the security and confidentiality of data protected?
    28 KB (4,147 words) - 12:41, 26 November 2020
  • File sharing platform for sharing non-protected files externally. |File Sharing – Protected B
    13 KB (1,794 words) - 17:25, 17 February 2022
  • **Password protected pages
    3 KB (452 words) - 13:18, 23 November 2021
  • *Disable WPS (Wi-Fi Protected Setup). Tools can be used to leverage this feature in order to steal passwo ...adian Internet Registration Authority (CIRA) have recently launched a free protected DNS service that prevents users from connecting to malicious websites and h
    10 KB (1,518 words) - 11:13, 27 May 2020
  • ...ies. Common examples of protected attributes are race and gender. Relevant protected attributes for the application of the system must be identified in order to ...ce between the values of a metric applied across the groups defined by a ''protected attribute''.
    21 KB (3,183 words) - 12:44, 23 December 2022
  • ...lessons learned and their plan on migration their system to the cloud once Protected B cloud becomes available.</td><td style="width:25%">GAC</td><td style="wid
    9 KB (1,331 words) - 08:49, 6 September 2019
  • ...commercially available Public Cloud contracts for Unclassified Data and a Protected B Framework (IaaS/PaaS) with AWS and Microsoft that customers can utilize.
    3 KB (500 words) - 01:49, 8 April 2020
  • With the needs of securing protected B data in a Public cloud, the office of GC Chief Technology Officer develop
    4 KB (613 words) - 00:26, 21 January 2020
  • | Road to Protected &lsquo;B&rsquo; Cloud || TBS/IMTD || Information
    6 KB (688 words) - 14:49, 27 December 2019
  • ...ling the secure sharing of audio, video, and documents in real-time (up to Protected B).  VidCruiter is a versatile platform, which allows users to schedule li ...and while MS Teams is available for internal HC/PHAC conversations at the Protected B level, any MS Teams meetings that include external participants are consi
    10 KB (1,445 words) - 09:52, 4 July 2022
  • ...acker to establish rogue websites that will appear to belong to the domain protected by the wildcard certificate. * Compromise of the private key renders all TLS sessions protected by that private key vulnerable; the use of a cipher suite supporting [https
    9 KB (1,365 words) - 18:13, 5 October 2022
  • *Ensure that teleconferences are set to private, as well as password protected. ...tools for collaboration with colleagues, starting with Microsoft Teams (at Protected B if your departmental tenancy has been accredited to that level, or unclas
    13 KB (1,884 words) - 10:25, 20 July 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)