NIST logo

Publications Portal

You searched on:
Author: peter mell

Displaying records 11 to 20 of 31 records.
Resort by: Date / Title


11. The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7435
Published: 8/30/2007
Authors: Peter M Mell, Karen Ann Scarfone, Sasha Romanosky
Abstract: The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. The National Vulnerability Database (NVD) provides specific CVSS scores for virtually all publicly know ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51231

12. A Complete Guide to the Common Vulnerability Scoring System Version 2.0
Published: 7/30/2007
Authors: Peter M Mell, Karen Ann Scarfone, Sasha Romanosky
Abstract: The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. CVSS consists of three groups: Base, Temporal and Environmental. Each group produces a numeric score ra ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51198

13. CVSS-SIG Version 2 History
Published: 7/30/2007
Authors: Peter M Mell, Karen Ann Scarfone, Gavin Reid
Abstract: This document attempts to interpret the history and rationale behind changes made in the Common Vulnerability Scoring System (CVSS) from version 1 to version 2 (referred to as CVSS v1 and v2 in this document.) This document contains multiple appendic ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51199

14. Guide to Intrusion Detection and Prevention Systems (IDPS)
Series: Special Publication (NIST SP)
Report Number: 800-94
Published: 2/20/2007
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50951

15. Common Vulnerability Scoring System
Published: 12/29/2006
Authors: Peter M Mell, Karen Kent Scarfone, Sasha Romanosky
Abstract: Organizations struggle to assess the relative importance of software vulnerabilities across disparate hardware and software platforms. They must prioritize vulnerabilities and remediate those that pose the greatest risk. However, most software vendor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50899

16. Guide to Malware Incident Prevention and Handling
Series: Special Publication (NIST SP)
Report Number: 800-83
Published: 11/23/2005
Authors: Peter M Mell, K Kent, Joseph Nusbaum
Abstract: This publication provides recommendations for improving an organizations malware incident prevention measures. It also gives extensive recommendations for enhancing an organizations existing incident response capability so that it is better prepare ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150416

17. Creating a Patch and Vulnerability Management Program
Series: Special Publication (NIST SP)
Report Number: 800-40v2.0
Published: 11/16/2005
Authors: Peter M Mell, Tiffany Bergeron, Dave Henning
Abstract: This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150402

18. An Overview of Issues in Testing Intrusion Detection Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7007
Published: 7/11/2003
Authors: Peter M Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
Abstract: While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50745

19. Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
Series: Special Publication (NIST SP)
Report Number: 800-51
Published: 9/1/2002
Authors: Peter M Mell, Timothy Grance
Abstract: The Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme is a dictionary of common names for publicly known information technology (IT) system vulnerabilities. It is an emerging industry standard that has achieved wide acceptance b ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151265

20. Procedures for Handling Security Patches
Series: Special Publication (NIST SP)
Report Number: 800-40
Published: 8/1/2002
Authors: Peter M Mell, M C Tracy
Abstract: Timely patching is critical to maintain the operational availability, confidentiality, and integrity of IT systems. However, failure to keep operating system and application software patched is the most common mistake made by information technology ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151264



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series