Search results
Jump to navigation
Jump to search
- **Password protected pages3 KB (452 words) - 13:18, 23 November 2021
- *Disable WPS (Wi-Fi Protected Setup). Tools can be used to leverage this feature in order to steal passwo ...adian Internet Registration Authority (CIRA) have recently launched a free protected DNS service that prevents users from connecting to malicious websites and h10 KB (1,518 words) - 11:13, 27 May 2020
- ...ies. Common examples of protected attributes are race and gender. Relevant protected attributes for the application of the system must be identified in order to ...ce between the values of a metric applied across the groups defined by a ''protected attribute''.21 KB (3,183 words) - 12:44, 23 December 2022
- ...lessons learned and their plan on migration their system to the cloud once Protected B cloud becomes available.</td><td style="width:25%">GAC</td><td style="wid9 KB (1,331 words) - 08:49, 6 September 2019
- ...commercially available Public Cloud contracts for Unclassified Data and a Protected B Framework (IaaS/PaaS) with AWS and Microsoft that customers can utilize.3 KB (500 words) - 01:49, 8 April 2020
- With the needs of securing protected B data in a Public cloud, the office of GC Chief Technology Officer develop4 KB (613 words) - 00:26, 21 January 2020
- |PROTECTED "A" |PROTECTED "B"10 KB (1,407 words) - 12:06, 2 May 2024
- | Road to Protected ‘B’ Cloud || TBS/IMTD || Information6 KB (688 words) - 14:49, 27 December 2019
- ...ling the secure sharing of audio, video, and documents in real-time (up to Protected B). VidCruiter is a versatile platform, which allows users to schedule li ...and while MS Teams is available for internal HC/PHAC conversations at the Protected B level, any MS Teams meetings that include external participants are consi10 KB (1,445 words) - 09:52, 4 July 2022
- ...acker to establish rogue websites that will appear to belong to the domain protected by the wildcard certificate. * Compromise of the private key renders all TLS sessions protected by that private key vulnerable; the use of a cipher suite supporting [https9 KB (1,365 words) - 18:13, 5 October 2022
- *Ensure that teleconferences are set to private, as well as password protected. ...tools for collaboration with colleagues, starting with Microsoft Teams (at Protected B if your departmental tenancy has been accredited to that level, or unclas13 KB (1,884 words) - 10:25, 20 July 2020
- All information provided to AISB is protected and can only be accessed as per the provisions of the Access to Information4 KB (571 words) - 09:12, 12 February 2024
- * Forms will have protected B status, on forward agenda, but no specific updates at this time3 KB (543 words) - 14:05, 13 December 2023
- | image = [[Image:protected.jpg|30px|Protected]] [[Category: Protected]]13 KB (2,003 words) - 17:38, 31 July 2019
- * Design web services so that they are protected from common security vulnerabilities such as SQL injection and others descr5 KB (753 words) - 10:29, 8 February 2021
- With the needs of securing protected B data in a Public cloud, the office of GC Chief Technology Officer develop6 KB (824 words) - 01:59, 8 April 2020
- ** Capability for hosting Protected B content5 KB (737 words) - 11:33, 13 May 2024
- ...accessible, infinitely scalable and secure by design. It's also the first Protected-B enterprise SAAS cloud-based solution in the Government of Canada. ...Under my leadership, the Cloud Competency Centre Division has delivered a Protected B Cloud environment on Amazon Web Services (AWS), migrated over 20 applicat11 KB (1,548 words) - 12:29, 12 April 2022
- |Never share protected or sensitive information, unless you have express consent from your departm5 KB (789 words) - 09:04, 24 April 2020
- ...rants authorization of a cloud-based service to process, store or transmit protected GC information''8 KB (993 words) - 11:56, 7 April 2021