00000000nam 2200000zi 4500
0019.921102
003CaOODSP
00520250507143435
006m     o  d f      
007cr cn|||||||||
008230320s2023    onc     ob   f000 0 eng d
020 |a9780660480800
040 |aCaOODSP|beng|erda|cCaOODSP
043 |an-cn---
0861 |aD97-4/40-110-2023E-PDF
24500|aDefending against data exfiltration threats.
264 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |c2023.
300 |a1 online resource (19 pages).
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aManagement ; |vITSM.40.110
500 |aIssued also in French under title: Défense contre les menaces d'exfiltration de données.
500 |aCover title.
500 |a"Unclassified / Non classifié."
500 |a"Canadian Centre for Cyber Security."
500 |a"This publication takes effect on April 12, 2023."
504 |aIncludes bibliographical references (page 17).
520 |a"According to National Institute of Standards and Technology (NIST), exfiltration is the unauthorized transfer of data from a network, system, or device. Data exfiltration is a tactic used by threat actors to accomplish their objectives, such as data theft, financial extortion and gain (e.g. ransomware or cultivating insider threats), and service disruption. Data exfiltration attacks occur in various forms, including data espionage, user or system credentials theft, financial data theft, digital identity compromise, and data de-anonymization. To protect against these attacks, your organizations should secure your data lifecycle processes (e.g. creation, operation, and destruction) from end to end. In this document, we discuss some known data exfiltration techniques and propose protection strategies that can be deployed to mitigate the impact from such threats"--Overview.
650 0|aComputer security|zCanada.
7102 |aCommunications Security Establishment (Canada), |eissuing body.
7102 |aCanadian Centre for Cyber Security, |eissuing body.
77508|tDéfense contre les menaces d'exfiltration de données.|w(CaOODSP)9.921104
830#0|aManagement series (Communications Security Establishment (Canada))|vITSM.40.110.|w(CaOODSP)9.842856
85640|qPDF|s700 KB|uhttps://publications.gc.ca/collections/collection_2023/cstc-csec/D97-4-40-110-2023-eng.pdf
8564 |qHTML|sN/A|uhttps://www.cyber.gc.ca/en/guidance/defending-against-data-exfiltration-threats-itsm40110