| 000 | 00000nam 2200000za 4500 |
| 001 | 9.843595 |
| 003 | CaOODSP |
| 005 | 20250506150909 |
| 007 | cr ||||||||||| |
| 008 | 170914s2016 onc ob f000 0 eng d |
| 040 | |aCaOODSP|beng |
| 043 | |an-cn--- |
| 086 | 1 |aD97-3/62-2016E-PDF |
| 245 | 00|aGuidance on securely configuring network protocols |h[electronic resource]. |
| 260 | |a[Ottawa] : |bCommunications Security Establishment, |c2016. |
| 300 | |a22 p. |
| 490 | 1 |aPractitioner series, information technology security guidance ; |vITSP.40.062 |
| 500 | |aIssued also in French under title: Conseils sur la configuration sécurisée des protocoles réseau. |
| 500 | |aCover title. |
| 500 | |a"Unclassified." |
| 500 | |a"August 2016." |
| 500 | |aIssued also in HTML format. |
| 504 | |aIncludes bibliographical references. |
| 520 | |a"The Government of Canada’s (GC) ability to securely transmit sensitive data and information is fundamental to the delivery of programs and services. Cryptographic security protocols provide security mechanisms which can be used to ensure the confidentiality, integrity, and authenticity of sensitive GC information. Data confidentiality, integrity, authenticity, stakeholder authentication and accountability, and non-repudiation are all benefits of properly configured security protocols. Various protocols may be required to satisfy security requirements, and each protocol should be selected and implemented to ensure all requirements are met. The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED, PROTECTED A, and PROTECTED B information"--Overview, p. 3. |
| 692 | 07|2gccst|aFederal government |
| 692 | 07|2gccst|aComputer security |
| 710 | 2 |aCommunications Security Establishment (Canada) |
| 775 | 08|tConseils sur la configuration sécurisée des protocoles réseau |w(CaOODSP)9.843596 |
| 830 | #0|aPractitioner series (Communications Security Establishment (Canada))|vITSP.40.062.|w(CaOODSP)9.842846 |
| 856 | 40|qPDF|s556 KB|uhttps://publications.gc.ca/collections/collection_2017/cstc-csec/D97-3-62-2016-eng.pdf |
| 856 | 4 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062 |