NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 211 to 220.
Resort by: Date / Title

211. Personal Identity Verification of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Topic: Cybersecurity
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentials and that use the cards to authenticate an individual's identity. FIPS 201 has been issued in two pa ...

212. Guidelines on PDA Forensics, Recommendations of the National Institute of Standards and Technology
Series: Special Publication (NIST SP)
Report Number: 800-72
Topic: Cybersecurity
Published: 11/1/2004
Authors: Wayne Jansen, Richard P Ayers
Abstract: Forensic specialists periodically encounter unusual devices and new technologies normally not envisaged as having immediate relevance from a digital forensics perspective. The objective of the guide is twofold: to help organizations evolve appropria ...

213. Securely Connecting the World with Cyber Security Standards
Topic: Cybersecurity
Published: 10/1/2004
Authors: Alicia Clay Jones, Michael D Hogan
Abstract: This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are nece ...

214. IT Security Metrics (ITL Bulletin)
Topic: Cybersecurity
Published: 8/4/2003
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin summarizes the recently published NIST Special Publication (SP) 800-55, Security Metrics Guide for Information Technology Systems, by Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo. NIST SP 800-55 provides ...

215. An Overview of Issues in Testing Intrusion Detection Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7007
Topic: Cybersecurity
Published: 7/11/2003
Authors: Peter M Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
Abstract: While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performa ...

216. Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities
Topic: Cybersecurity
Published: 10/1/2002
Author: Elizabeth B Lennon
Abstract: : Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities ...

217. Contingency Planning Guide for Information Technology Systems
Series: ITL Bulletin
Report Number: June
Topic: Cybersecurity
Published: 6/1/2002
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin summarizes NIST SP 800-34, Contingency Planning Guide for Information Technology Systems. It describes the process of developing contingency plans, procedures, and technical measures that can enable a system to be recovered quickly ...

218. Randomness Testing of the Advanced Encryption Standard Finalist Candidates
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6483
Topic: Cybersecurity
Published: 4/1/2000
Authors: Juan Soto, Lawrence E Bassham
Abstract: Mars, RC6, Rijndael, Serpent and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' suitability as random number generators, empirical statistical testing is commonly employed. Although it widely ...

219. The Advanced Encryption Standard: A Status Report
Topic: Cybersecurity
Published: 8/25/1999
Author: Elizabeth B Lennon
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal Information, in furtherance of NIST's statutory responsibilit ...

220. Establishing a Computer Security Incident Response Capability (CSIRC)
Series: Special Publication (NIST SP)
Report Number: 800-3
Topic: Cybersecurity
Published: 11/1/1991
Author: John P Wack

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series