NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 121 to 130 of 240 records.
Resort by: Date / Title


121. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Murugiah P Souppaya, Melanie Cook, Karen Scarfone
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732

122. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1
Series: Special Publication (NIST SP)
Report Number: 800-126 Rev 1
Topic: Cybersecurity
Published: 2/25/2011
Authors: David Anthony Waltermire, Stephen D Quinn, Karen Scarfone
Abstract: This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software comm ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907893

123. Managing Security: The Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

124. Internet Protocol Version 6 (IPv6): NIST Guidelines Help Organizations Manage the Secure Deployment of the New Network Protocol
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/31/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907826

125. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Topic: Cybersecurity
Published: 12/31/2010
Authors: William T Polk, Donna F Dodson, William E. (William E.) Burr, Hildegard Ferraiolo, David A Cooper
Abstract: This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as the supporting infrastructure specified in FIPS 201 and the related Special Publication 800-73, Interfaces f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537

126. Guidelines for the Secure Deployment of IPv6
Series: Special Publication (NIST SP)
Report Number: 800-119
Topic: Cybersecurity
Published: 12/29/2010
Authors: Sheila E Frankel, Richard Graveman, John Pearce, Mark Rooks
Abstract: Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol, NIST undertook the development of a guide to help educate federal agencies about the possibl ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907211

127. k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks
Topic: Cybersecurity
Published: 12/10/2010
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
Abstract: The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905605

128. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

129. Intrusion Detection and Prevention Systems
Topic: Cybersecurity
Published: 10/22/2010
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901146

130. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
Series: Special Publication (NIST SP)
Report Number: 800-38A Addendum
Topic: Cybersecurity
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series