NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 141 to 150 of 225 records.
Resort by: Date / Title

141. Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans (NIST SP 800-53A, Revision 1)
Series: Special Publication (NIST SP)
Report Number: 800-53
Topic: Cybersecurity
Published: 6/29/2010
Authors: Ronald S Ross, L Arnold Johnson
Abstract: Special Publication 800-53A, Revision 1 provides guidelines for developing security assessment plans and associated security control assessment procedures that are consistent with Special Publication 800-53, Revision 3, Recommended Security Controls ...

142. Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7676
Topic: Cybersecurity
Published: 6/18/2010
Author: David A Cooper
Abstract: NIST Special Publication 800-73-3 introduces the ability to store retired Key Management Keys within the Personal Identity Verification (PIV) Card Application on a PIV Card. This paper complements SP 800-73-3 by providing some of the rationale for t ...

143. Contingency Planning Guide for Federal Information Systems
Series: Special Publication (NIST SP)
Report Number: 800-34 rev 1
Topic: Cybersecurity
Published: 6/8/2010
Authors: Marianne Swanson, Pauline Bowen, Wohl Phillips Amy, Dean Gallup, David Lynes
Abstract: This publication assists organizations in understanding the purpose, process, and format of information system contingency planning development through practical, real-world guidelines. This guidance document provides background information on inter ...

144. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Series: Special Publication (NIST SP)
Report Number: 800-122
Topic: Cybersecurity
Published: 4/6/2010
Authors: Erika McCallister, Timothy Grance, Karen Ann Scarfone
Abstract: The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the con ...

145. On Hash Functions Using Checksums
Topic: Cybersecurity
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...

146. Revised Guide Helps Federal Organizations Improve Their Risk Management Practices and Information System Security
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/29/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Developed by NIST in partnership ...

147. Computer Security Division 2009 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7653
Topic: Cybersecurity
Published: 3/23/2010
Author: Patrick D O'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publication ...

148. Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/24/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing ...

149. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-2
Topic: Cybersecurity
Published: 2/19/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr
Abstract: This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as the supporting infrastructure specified in FIPS 201 and the related Special Publication 800-73, Interfaces f ...

150. Interfaces for Personal Identity Verification (4 parts) - Part 1: End-Point PIV Card Application Namespace, Data Model and Representation; Part 2: End-Point PIV Card Application Card Command Interface; Part 3: End-Point Client Application Programming Interface; Part 4: The PIV Transitional Data Model and Interfaces
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Hildegard Ferraiolo, David A Cooper
Abstract: FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that th ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series