000
| 02117nam 2200397zi 4500 |
---|
001 | 9.916519 |
---|
003 | CaOODSP |
---|
005 | 20230208141008 |
---|
006 | m o d f |
---|
007 | cr cn||||||||| |
---|
008 | 221024t20222022onca o f000 0 eng d |
---|
020 | |a9780660459509 |
---|
040 | |aCaOODSP|beng|erda|cCaOODSP |
---|
041 | 1 |aeng|bfre |
---|
043 | |an-cn--- |
---|
086 | 1 |aD96-9/2022E-PDF |
---|
245 | 03|aAn introduction to the cyber threat environment. |
---|
264 | 1|aOttawa, ON : |bCommunications Security Establishment = Centre de la sécurité des telecommunications, |c[2022] |
---|
264 | 4|c©2022 |
---|
300 | |a1 online resource (15 pages) : |billustrations |
---|
336 | |atext|btxt|2rdacontent |
---|
337 | |acomputer|bc|2rdamedia |
---|
338 | |aonline resource|bcr|2rdacarrier |
---|
500 | |aISBN (978-0-660-45952-3) and catalogue number (D96-9/2022) found on page [2 of 18] are issued for bilingual paper format. |
---|
500 | |aIssued also in French under title: Introduction à l'environnement de cybermenaces. |
---|
500 | |aIssued also in HTML format. |
---|
520 | |a"This document describes common concepts relevant to discussions about cyber threat activity in the Canadian context and acts as a point of reference for Canadian Centre for Cyber Security (Cyber Centre) publications. This introductory document provides baseline knowledge about the cyber threat environment, including cyber threat actors and their motivations, sophistication, techniques, tools, and the cyber threat surface"--Page 1. |
---|
546 | |aIncludes some text in French. |
---|
650 | 0|aComputer crimes. |
---|
710 | 2 |aCommunications Security Establishment (Canada), |eissuing body. |
---|
775 | 08|tIntroduction à l'environnement de cybermenaces.|w(CaOODSP)9.916520 |
---|
776 | 0#|tAn introduction to the cyber threat environment.|w(CaOODSP)9.916521 |
---|
795 | |tCanadian Centre for Cyber Security |w9.865803 |
---|
856 | 40|qPDF|s2.42 MB|uhttps://publications.gc.ca/collections/collection_2023/cstc-csec/D96-9-2022-eng.pdf |
---|
856 | 4 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/introduction-cyber-threat-environment |
---|