NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 191 to 200 of 248 records.
Resort by: Date / Title

191. Guide to General Server Security
Series: Special Publication (NIST SP)
Report Number: 800-123
Topic: Cybersecurity
Published: 7/25/2008
Authors: Karen Ann Scarfone, Wayne Jansen, Miles C. Tracy
Abstract: The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The docume ...

192. Guide to Securing Legacy IEEE 802.11 Wireless Networks
Series: Special Publication (NIST SP)
Report Number: 800-48 Rev 1
Topic: Cybersecurity
Published: 7/25/2008
Authors: Karen Ann Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
Abstract: The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an ...

193. Web Services Security: Techniques and Challenges (Extended Abstract)
Topic: Cybersecurity
Published: 7/21/2008
Author: Anoop Singhal
Abstract: Web services-based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web services security, several research problems must be solved to make secu ...

194. An Attack Graph Based Probabilistic Security Metric
Topic: Cybersecurity
Published: 7/16/2008
Authors: Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia
Abstract: To protect critical resources in today's networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now becomes feasible due to a model of causal relationships betwee ...

195. Performance Measurement Guide for Information Security
Series: Special Publication (NIST SP)
Report Number: 800-55 Rev 1
Topic: Cybersecurity
Published: 7/16/2008
Authors: Elizabeth Chew, Marianne M. Swanson, Kevin Mcguire Stine, N Bartol, Anthony Brown, W Robinson
Abstract: This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional secur ...

196. Dynamic Routing and Congestion Control Through Random Assignment of Routes
Topic: Cybersecurity
Published: 7/15/2008
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We introduce an algorithm for maximizing utility through congestion control and random allocation of routes to users. The allocation is defined by a probability distribution whose degree of randomness as measured by its entropy, is controlled. We se ...

197. Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
Series: Special Publication (NIST SP)
Report Number: 800-53A
Topic: Cybersecurity
Published: 7/1/2008
Authors: Ronald S Ross, L A. Johnson, Stuart William Katzke, Patricia R Toth, G. Stoneburner, G Rogers
Abstract: [Superseded by NIST SP 800-53A, Rev. 1 (June 2010):] The purpose of NIST Special Publication 800-53A is to provide guidelines for building effective security assessment plans and pro ...

198. A Framework for Measuring the Vulnerability of Hosts
Topic: Cybersecurity
Published: 6/30/2008
Authors: Karen Ann Scarfone, Timothy Grance
Abstract: This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually c ...

199. Policy Specification and Enforcement for Smart ID Cards Deployment
Topic: Cybersecurity
Published: 6/3/2008
Author: Ramaswamy Chandramouli
Abstract: Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Ma ...

200. Can TCP Metastability Explain Cascading Failures and Justify Flow Admission Control in the Internet?
Topic: Cybersecurity
Published: 6/2/2008
Author: Vladimir V Marbukh
Abstract: This paper discusses implications of possible metastability of TCP-type fair bandwidth sharing under random flow arrivals/departures for understanding and defending the Internet against cascading failures.  Cascading failures can be viewed as a ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series