NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 101 to 110 of 210 records.
Resort by: Date / Title


101. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70rev2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Karen Scarfone, Melanie Cook, Murugiah P Souppaya
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732

102. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1
Series: Special Publication (NIST SP)
Report Number: 800-126rev1
Topic: Cybersecurity
Published: 2/25/2011
Authors: David Anthony Waltermire, Stephen D Quinn, Karen Scarfone
Abstract: This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software comm ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907893

103. Managing Security Using the Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: This article summarizes the information that was presented in the Information Technology Laboratory (ITL) bulletin, Security Content Automation Protocol (SCAP) Helping Organizations Maintain and Verify the Security of their Information Systems, which ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

104. Internet Protocol Version 6 (IPv6): NIST Guidelines Help Organizations Manage the Secure Deployment of the New Network Protocol
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/31/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907826

105. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Topic: Cybersecurity
Published: 1/5/2011
Authors: William T Polk, Donna F Dodson, William Edward Burr, Hildegard Ferraiolo, David A Cooper
Abstract: This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as the supporting infrastructure specified in FIPS 201 and the related Special Publication 800-73, Interfaces f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537

106. Guidelines for the Secure Deployment of IPv6
Series: Special Publication (NIST SP)
Report Number: 800-119
Topic: Cybersecurity
Published: 12/29/2010
Authors: Sheila E Frankel, Richard Graveman, John Pearce, Mark Rooks
Abstract: Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol, NIST undertook the development of a guide to help educate federal agencies about the possibl ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907211

107. Thoughts on Higher Education and Scientific Research
Topic: Cybersecurity
Published: 12/13/2010
Authors: Jeffrey Mark Voas, George Hurlburt, Keith Miller, Bret Michael
Abstract: The paper traces the relationship of tipping points to non-linear phenomena as a point of departure to examine the negative effects of purely linear thinking on society. With this backdrop, we then examine the reductionist state of academia and presc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906871

108. k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks
Topic: Cybersecurity
Published: 12/10/2010
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
Abstract: The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905605

109. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

110. Intrusion Detection and Prevention Systems
Topic: Cybersecurity
Published: 10/22/2010
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901146



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series