NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 211 to 220 of 221 records.
Resort by: Date / Title

211. An Overview and Analysis of PDA Forensic Tools
Topic: Cybersecurity
Published: 4/2/2005
Authors: Wayne Jansen, Richard P Ayers
Abstract: Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidenc ...

212. Personal Identity Verification of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Topic: Cybersecurity
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: [Superseded by FIPS 201-1 (March 2006):] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentia ...

213. Guidelines on PDA Forensics, Recommendations of the National Institute of Standards and Technology
Series: Special Publication (NIST SP)
Report Number: 800-72
Topic: Cybersecurity
Published: 11/1/2004
Authors: Wayne Jansen, Richard P Ayers
Abstract: Forensic specialists periodically encounter unusual devices and new technologies normally not envisaged as having immediate relevance from a digital forensics perspective. The objective of the guide is twofold: to help organizations evolve appropria ...

214. Securely Connecting the World with Cyber Security Standards
Topic: Cybersecurity
Published: 10/1/2004
Authors: Alicia Clay Jones, Michael D Hogan
Abstract: This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are nece ...

215. IT Security Metrics (ITL Bulletin)
Topic: Cybersecurity
Published: 8/4/2003
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin summarizes the recently published NIST Special Publication (SP) 800-55, Security Metrics Guide for Information Technology Systems, by Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo. NIST SP 800-55 provides ...

216. An Overview of Issues in Testing Intrusion Detection Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7007
Topic: Cybersecurity
Published: 7/11/2003
Authors: Peter M Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
Abstract: While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performa ...

217. Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities
Topic: Cybersecurity
Published: 10/1/2002
Author: Elizabeth B Lennon
Abstract: : Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities ...

218. Contingency Planning Guide for Information Technology Systems
Series: ITL Bulletin
Report Number: June
Topic: Cybersecurity
Published: 6/1/2002
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin summarizes NIST SP 800-34, Contingency Planning Guide for Information Technology Systems. It describes the process of developing contingency plans, procedures, and technical measures that can enable a system to be recovered quickly ...

219. Randomness Testing of the Advanced Encryption Standard Finalist Candidates
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6483
Topic: Cybersecurity
Published: 4/1/2000
Authors: Juan Soto, Lawrence E Bassham
Abstract: Mars, RC6, Rijndael, Serpent and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' suitability as random number generators, empirical statistical testing is commonly employed. Although it widely ...

220. The Advanced Encryption Standard: A Status Report
Topic: Cybersecurity
Published: 8/25/1999
Author: Elizabeth B Lennon
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal Information, in furtherance of NIST's statutory responsibilit ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series