NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 131 to 140 of 244 records.
Resort by: Date / Title


131. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

132. Intrusion Detection and Prevention Systems
Topic: Cybersecurity
Published: 10/22/2010
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901146

133. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
Series: Special Publication (NIST SP)
Report Number: 800-38A Addendum
Topic: Cybersecurity
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

134. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Cybersecurity
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

135. In Trust we Trust
Topic: Cybersecurity
Published: 10/14/2010
Authors: Keith Miller, Jeffrey Mark Voas, Phillip Laplante
Abstract: The term trust has had a well understood definition for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a public cloud, the need to reconsider what trust means for a public ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906142

136. An Inconvenient Truth About Tunneled Authentications
Topic: Cybersecurity
Published: 10/10/2010
Authors: Katrin Hoeper, Lidong Chen
Abstract: In recent years, it has been a common practice to execute client authentications for network access inside a protective tunnel. Man-in-the-middle (MitM) attacks on such tunneled authentications have been discovered early on and cryptographic bindings ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906200

137. Guide to Securing WiMAX Wireless Communications
Series: Special Publication (NIST SP)
Report Number: 800-127
Topic: Cybersecurity
Published: 9/30/2010
Authors: Karen Ann Scarfone, Cyrus Tibbs, Matt Sexton
Abstract: The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and to provide recommendations on using these capabilities. WiMAX technology is a wireless met ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906186

138. Guidelines for Smart Grid Cyber Security
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628
Topic: Cybersecurity
Published: 8/31/2010
Author: Annabelle Lee
Abstract: [Superseded by NISTIR 7628 Rev. 1 (Sep. 2014), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068] Smart Grid technologies will introduce millions of new intelligent components to the electric grid that communicate in much more advan ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906224

139. Introduction: Cybersecurity
Topic: Cybersecurity
Published: 8/31/2010
Author: David R Kuhn
Abstract: Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905995

140. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81 Rev 1
Topic: Cybersecurity
Published: 8/27/2010
Author: Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-81-2 (September 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217] This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series