NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 61 to 70 of 111 records.
Resort by: Date / Title


61. It's All About The Benjamins: Fair Trade botnets and incentivizing users to ignore security advice
Topic: Cybersecurity
Published: 2/28/2011
Authors: Serge M. (Serge) Egelman, Nicolas Christin, Timothy Vidas, Jens Grossklags
Abstract: We examine the cost for an attacker to pay users to execute arbitrary code---potentially malware. We created an Amazon's Mechanical Turk task wherein users were asked to download and run for an hour an executable we wrote. While this program was ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907421

62. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Murugiah P Souppaya, Melanie Cook, Karen Scarfone
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732

63. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1
Series: Special Publication (NIST SP)
Report Number: 800-126 Rev 1
Topic: Cybersecurity
Published: 2/25/2011
Authors: David Anthony Waltermire, Stephen D Quinn, Karen Scarfone
Abstract: This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software comm ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907893

64. Managing Security: The Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

65. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Topic: Cybersecurity
Published: 12/31/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr, Hildegard Ferraiolo, David A Cooper
Abstract: This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as the supporting infrastructure specified in FIPS 201 and the related Special Publication 800-73, Interfaces f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537

66. Guidelines for the Secure Deployment of IPv6
Series: Special Publication (NIST SP)
Report Number: 800-119
Topic: Cybersecurity
Published: 12/29/2010
Authors: Sheila E Frankel, Richard Graveman, John Pearce, Mark Rooks
Abstract: Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol, NIST undertook the development of a guide to help educate federal agencies about the possibl ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907211

67. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Cybersecurity
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

68. In Trust we Trust
Topic: Cybersecurity
Published: 10/14/2010
Authors: Keith Miller, Jeffrey Mark Voas, Phillip Laplante
Abstract: The term trust has had a well understood definition for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a public cloud, the need to reconsider what trust means for a public ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906142

69. Guide to Securing WiMAX Wireless Communications
Series: Special Publication (NIST SP)
Report Number: 800-127
Topic: Cybersecurity
Published: 9/30/2010
Authors: Karen Ann Scarfone, Cyrus Tibbs, Matt Sexton
Abstract: The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and to provide recommendations on using these capabilities. WiMAX technology is a wireless met ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906186

70. Guidelines for Smart Grid Cyber Security
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628
Topic: Cybersecurity
Published: 8/31/2010
Author: Annabelle Lee
Abstract: [Superseded by NISTIR 7628 Rev. 1 (Sep. 2014), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068] Smart Grid technologies will introduce millions of new intelligent components to the electric grid that communicate in much more advan ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906224



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series