NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 91 to 100 of 130 records.
Resort by: Date / Title


91. Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7676
Topic: Cybersecurity
Published: 6/18/2010
Author: David A Cooper
Abstract: NIST Special Publication 800-73-3 introduces the ability to store retired Key Management Keys within the Personal Identity Verification (PIV) Card Application on a PIV Card. This paper complements SP 800-73-3 by providing some of the rationale for t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905913

92. Contingency Planning Guide for Federal Information Systems [including updates through 11/11/2010]
Series: Special Publication (NIST SP)
Report Number: 800-34 Rev 1
Topic: Cybersecurity
Published: 5/30/2010
Authors: Marianne M. Swanson, Pauline Bowen, Amy Wohl Phillips, Dean Gallup, David Lynes
Abstract: This publication assists organizations in understanding the purpose, process, and format of information system contingency planning development through practical, real-world guidelines. This guidance document provides background information on inter ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905266

93. Recommended Security Controls for Federal Information Systems and Organizations [includes updates through 5/1/2010]
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 3
Topic: Cybersecurity
Published: 5/1/2010
Author: Ronald S Ross
Abstract: [Superseded by NIST SP 800-53 Rev. 4 (April 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918664] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy the breadth and depth of security requir ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280

94. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81 Rev 1
Topic: Cybersecurity
Published: 4/30/2010
Author: Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-81-2 (September 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217] This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113

95. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Series: Special Publication (NIST SP)
Report Number: 800-122
Topic: Cybersecurity
Published: 4/6/2010
Authors: Erika McCallister, Timothy Grance, Karen Ann Scarfone
Abstract: The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the con ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904990

96. On Hash Functions Using Checksums
Topic: Cybersecurity
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

97. Computer Security Division 2009 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7653
Topic: Cybersecurity
Published: 3/23/2010
Author: Patrick D O\'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publication ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905148

98. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 2/22/2010
Authors: Ronald S Ross, L A. Johnson
Abstract: [Superseded by SP 800-37 Rev. 1 (February 2010, w/updates through 6/5/2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094] The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to fe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904985

99. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr., Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: [Superseded by SP 800-73-4 (May 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918402] FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities inclu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904797

100. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: [Superseded by: SP 800-57 Part 3 Rev. 1 (January 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917445] Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides genera ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series