NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 1 to 10 of 220 records.
Resort by: Date / Title


1. A Cybersecurity Testbed for Industrial Control Systems
Topic: Cybersecurity
Published: 10/9/2014
Authors: Richard Candell, Keith A Stouffer, Dhananjay Anand
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity testbed for industrial control systems (ICS). The goal of this testbed is to measure the performance of an ICS when instrumented with cybersecurity protections i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915876

2. Release of NIST Interagency Report 7946, CVSS Implementation Guidance
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/10/2014
Authors: Harold Booth, Joshua M Franklin, Larry Feldman, Greg Witte
Abstract: The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global Vulne ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916242

3. I Can't Type That! P@$$w0rd Entry on Mobile Devices
Topic: Cybersecurity
Published: 6/22/2014
Authors: Kristen Greene, Melissa A. Gallagher, Brian C Stanton, Paul Y Lee
Abstract: Given the numerous constraints of onscreen keyboards, such as smaller keys and lack of tactile feedback, remembering and typing long, complex passwords , an already burdensome task on desktop computing systems ,becomes nearly unbearable on small ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914910

4. Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37rev 1
Topic: Cybersecurity
Published: 6/10/2014
Author: Ronald S Ross
Abstract: This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094

5. Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management
Topic: Cybersecurity
Published: 6/3/2014
Authors: Kelley L Dempsey, Ronald S Ross, Kevin Mcguire Stine
Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, int ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916095

6. NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure
Topic: Cybersecurity
Published: 6/2/2014
Author: Victoria Y Pillitteri
Abstract: On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915855

7. NIST's Role in Improving Critical Infrastructure Cybersecurity: Public/Private Teamwork
Topic: Cybersecurity
Published: 6/2/2014
Author: William C Barker
Abstract: National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection aren‰t useful unless adopted, so NIST seeks, while fostering creation of effective cybersecuri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916056

8. Small and Medium-size Business Information Security Outreach Program
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/13/2014
Authors: Richard L Kissel, Kim Quill, Chris Johnson
Abstract: Small and medium-sized businesses (SMBs) represent 99.7 percent of all U.S. employers and are an important segment of the U.S. economy. These organizations, totaling more than 28.2 million, create over 60 percent of all new U.S. private-sector jobs a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916061

9. A Model Towards Using Evidence from Security Events for Network Attack Analysis
Topic: Cybersecurity
Published: 4/28/2014
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915771

10. United States Federal Employees' Password Management Behaviors ‹ a Department of Commerce case study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7991
Topic: Cybersecurity
Published: 4/8/2014
Authors: Yee-Yin Choong, Mary Frances Theofanos, Hung-Kung Liu
Abstract: Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies and password requirements on how users should generate and maintain their passwords, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914843



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series