NIST logo
NIST Home > Information Technology Programs and Projects 
 

Information Technology Programs & Projects

(showing 46 - 60 of 151)
Cryptographic Algorithm Validation Program
Last Updated Date: 01/15/2013

The Cryptographic Algorithm Validation Program (CAVP) encompasses validation testing for FIPS-approved and NIST recommended cryptographic … more

Awareness, Training, Education (ATE) and Professional Development
Last Updated Date: 01/15/2013

This site is an organized set of links to business, college, and university websites that contain information security awareness, training, … more

Program Review for Information Security Management Assistance (PRISMA)
Last Updated Date: 01/15/2013

The Program Review for Information Security Management Assistance (PRISMA) includes many review options and incorporates guidelines contained in … more

Information Security and Privacy Advisory Board (ISPAB)
Last Updated Date: 01/15/2013

The Information Security and Privacy Advisory Board (ISPAB) was originally created by the Computer Security Act of 1987 (P.L. 100-235) as the … more

Federal Information Systems Security Educators' Association (FISSEA)
Last Updated Date: 01/15/2013

The Federal Information Systems Security Educators' Association (FISSEA), founded in 1987, is an organization run by and for information systems … more

Federal Computer Security Program Managers' Forum (Forum)
Last Updated Date: 01/15/2013

The Federal Computer Security Program Managers' Forum is an informal group sponsored by the National Institute of Standards and Technology (NIST) … more

IT System and Network Administration
Last Updated Date: 01/15/2013

The Information Technology (IT) System and Network Administration site represents NIST resources for managing, maintaining, and securing IT … more

Model Driven Security Functional Testing
Last Updated Date: 01/15/2013

Model-Driven Engineering (MDE) is emerging as a promising approach that uses models to support various phases of system development lifecycle such … more

Mobile Security and Forensics
Last Updated Date: 01/15/2013

The goal of the project is to improve the security of mobile devices and software. To that end, we devise and implement, as proof-of-concept … more

Personal Identity Verification (PIV) of Federal Employees and Contractors
Last Updated Date: 01/15/2013

On August 27, 2004, the President signed Homeland Security Presidential Directive 12 (HSPD-12), entitled "Policy for a Common Identification … more

Federal Desktop Core Configuration (FDCC)
Last Updated Date: 01/15/2013

The Federal Desktop Core Configuration (FDCC) is an OMB-mandated security configuration. The FDCC currently exists for Microsoft Windows Vista and … more

Biometric Standards Program and Resource Center
Last Updated Date: 01/15/2013

Supporting the national strategy on biometrics and the development of required biometric standards is the cornerstone of our program. We seek to … more

Security Configuration Checklists for Commercial IT Products
Last Updated Date: 01/15/2013

The solutions to IT security are complex, one basic but effective tool is a security configuration checklist. A security checklist is a document … more

National Checklist Program
Last Updated Date: 01/15/2013

The National Checklist Program (NCP) is the U.S. government repository of publicly available security checklists (or benchmarks) that provide … more

Automated Combinatorial Testing for Software (ACTS)
Last Updated Date: 01/15/2013

Empirical evidence suggests that nearly all software errors are triggered by the interaction of one to six parameters. These results have … more

Contact
General Information:
301-975-NIST (6478)
inquiries@nist.gov

100 Bureau Drive, Stop 1070
Gaithersburg, MD 20899-1070