<?xml version="1.0" encoding="UTF-8"?><marc:collection xmlns:marc="http://www.loc.gov/MARC21/slim">
  <marc:record>
    <marc:leader>00000nam  2200000zi 4500</marc:leader>
    <marc:controlfield tag="001">9.921102</marc:controlfield>
    <marc:controlfield tag="003">CaOODSP</marc:controlfield>
    <marc:controlfield tag="005">20250507143435</marc:controlfield>
    <marc:controlfield tag="006">m     o  d f      </marc:controlfield>
    <marc:controlfield tag="007">cr cn|||||||||</marc:controlfield>
    <marc:controlfield tag="008">230320s2023    onc     ob   f000 0 eng d</marc:controlfield>
    <marc:datafield tag="020" ind1=" " ind2=" ">
      <marc:subfield code="a">9780660480800</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="040" ind1=" " ind2=" ">
      <marc:subfield code="a">CaOODSP</marc:subfield>
      <marc:subfield code="b">eng</marc:subfield>
      <marc:subfield code="e">rda</marc:subfield>
      <marc:subfield code="c">CaOODSP</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="043" ind1=" " ind2=" ">
      <marc:subfield code="a">n-cn---</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="086" ind1="1" ind2=" ">
      <marc:subfield code="a">D97-4/40-110-2023E-PDF</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="245" ind1="0" ind2="0">
      <marc:subfield code="a">Defending against data exfiltration threats.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="264" ind1=" " ind2="1">
      <marc:subfield code="a">[Ottawa] : </marc:subfield>
      <marc:subfield code="b">Communications Security Establishment = Centre de la sécurité des telecommunications, </marc:subfield>
      <marc:subfield code="c">2023.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="300" ind1=" " ind2=" ">
      <marc:subfield code="a">1 online resource (19 pages).</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="336" ind1=" " ind2=" ">
      <marc:subfield code="a">text</marc:subfield>
      <marc:subfield code="b">txt</marc:subfield>
      <marc:subfield code="2">rdacontent</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="337" ind1=" " ind2=" ">
      <marc:subfield code="a">computer</marc:subfield>
      <marc:subfield code="b">c</marc:subfield>
      <marc:subfield code="2">rdamedia</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="338" ind1=" " ind2=" ">
      <marc:subfield code="a">online resource</marc:subfield>
      <marc:subfield code="b">cr</marc:subfield>
      <marc:subfield code="2">rdacarrier</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="490" ind1="1" ind2=" ">
      <marc:subfield code="a">Management ; </marc:subfield>
      <marc:subfield code="v">ITSM.40.110</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Issued also in French under title: Défense contre les menaces d'exfiltration de données.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">Cover title.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">"Unclassified / Non classifié."</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">"Canadian Centre for Cyber Security."</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="500" ind1=" " ind2=" ">
      <marc:subfield code="a">"This publication takes effect on April 12, 2023."</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="504" ind1=" " ind2=" ">
      <marc:subfield code="a">Includes bibliographical references (page 17).</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="520" ind1=" " ind2=" ">
      <marc:subfield code="a">"According to National Institute of Standards and Technology (NIST), exfiltration is the unauthorized transfer of data from a network, system, or device. Data exfiltration is a tactic used by threat actors to accomplish their objectives, such as data theft, financial extortion and gain (e.g. ransomware or cultivating insider threats), and service disruption. Data exfiltration attacks occur in various forms, including data espionage, user or system credentials theft, financial data theft, digital identity compromise, and data de-anonymization. To protect against these attacks, your organizations should secure your data lifecycle processes (e.g. creation, operation, and destruction) from end to end. In this document, we discuss some known data exfiltration techniques and propose protection strategies that can be deployed to mitigate the impact from such threats"--Overview.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="650" ind1=" " ind2="0">
      <marc:subfield code="a">Computer security</marc:subfield>
      <marc:subfield code="z">Canada.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="710" ind1="2" ind2=" ">
      <marc:subfield code="a">Communications Security Establishment (Canada), </marc:subfield>
      <marc:subfield code="e">issuing body.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="710" ind1="2" ind2=" ">
      <marc:subfield code="a">Canadian Centre for Cyber Security, </marc:subfield>
      <marc:subfield code="e">issuing body.</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="775" ind1="0" ind2="8">
      <marc:subfield code="t">Défense contre les menaces d'exfiltration de données.</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.921104</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="830" ind1="#" ind2="0">
      <marc:subfield code="a">Management series (Communications Security Establishment (Canada))</marc:subfield>
      <marc:subfield code="v">ITSM.40.110.</marc:subfield>
      <marc:subfield code="w">(CaOODSP)9.842856</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="856" ind1="4" ind2="0">
      <marc:subfield code="q">PDF</marc:subfield>
      <marc:subfield code="s">700 KB</marc:subfield>
      <marc:subfield code="u">https://publications.gc.ca/collections/collection_2023/cstc-csec/D97-4-40-110-2023-eng.pdf</marc:subfield>
    </marc:datafield>
    <marc:datafield tag="856" ind1="4" ind2=" ">
      <marc:subfield code="q">HTML</marc:subfield>
      <marc:subfield code="s">N/A</marc:subfield>
      <marc:subfield code="u">https://www.cyber.gc.ca/en/guidance/defending-against-data-exfiltration-threats-itsm40110</marc:subfield>
    </marc:datafield>
  </marc:record>
</marc:collection>
