Below you’ll find all of CIRA’s resource publications, including white papers, factsheets and other in-depth reports, arranged by newest publication first.

CIRA's strategic plans, corporate plans and annual reports are also easily accessible in our Corporate Reports section.


Canadians have their say. The third annual Canadian Internet Forum held February, 2013 by .CA hosted panels and presentations focused on cyber-security, digital literacy and Internet Governance.

CIRA’s intention for publishing an IPv6 Security policy is to apply best practices to the implementation and overall management of the IPv6 protocol on CIRA’s network. The IPv6 protocol shares many similarities with IPv4 but there are also significant differences. These differences include 128 bit IP address space, additional features in ICMPv6, new multicast addresses and neighbour discovery just to name a few.

Presentation of CIRA's experience in deploying IPv6 providing background, technical details, and testing methodologies. 

Most of what we do online falls into one of three categories: Talk, Shop and Play. There are risks associated with all these activities that consumers need to be aware of so they can take the necessary steps to protect themselves and their computers.


The Cyber Security Game is a lesson plan for a game to help students learn about being safe online. In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using the Cyber Security Tip Sheet, students explore the many tools and strategies that can be used to mitigate or prevent negative online experiences. 

Visiting websites is the most basic part of using the Internet. It can open up a world of fun and opportunity or a lot of unexpected problems, depending on how careful and well‐prepared you are.

Despite the benefits of online commerce, there are a few pitfalls and risks to watch out for in order to make your online shopping a positive experience.

This tip sheet will explain some of the issues we face when we socialize online and provide tips for dealing with them.

Unfortunately, while many smartphones are nearly as powerful as computers, we often don’t use the same caution with them as we do with our computers—and they often don’t have the privacy and security safeguards that come built into computers. 

Findings from a national survey on online surveillance between July 24 and July 28, 2013.