NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: date

Displaying records 1 to 10 of 132 records.
Resort by: Date / Title


1. Baseline Tailor User Guide
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8130
Topic: Cybersecurity
Published: 4/25/2016
Author: Joshua Lubell
Abstract: This guide describes how to use Baseline Tailor, a software tool for navigating the United States Government's Cybersecurity Framework and for tailoring the National Institute of Standards and Technology Special Publication 800-53 Revision 4 secu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920624

2. PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-4 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85A-4
Topic: Cybersecurity
Published: 4/13/2016
Authors: David A Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
Abstract: NIST Special Publication (SP) 800-73 contains the technical specifications to interface with the smart card to retrieve and use the Personal Identity Verification (PIV) identity credentials. This document, SP 800-85A, contains the test assertions and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920340

3. Recommendation for Key Management, Part 1: General
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 4
Topic: Cybersecurity
Published: 1/28/2016
Author: Elaine B Barker
Abstract: This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919831

4. Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8055
Topic: Cybersecurity
Published: 1/20/2016
Authors: Michael James Bartock, Jeffrey A Cichonski, Murugiah P Souppaya, Paul Fox, Mike Miller, Ryan Holley, Karen Scarfone
Abstract: This report documents proof of concept research for Derived Personal Identity Verification (PIV) Credentials. Smart card-based PIV Cards cannot be readily used with most mobile devices, such as smartphones and tablets, but Derived PIV Credentials (DP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919821

5. Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8074 Volume 1
Topic: Cybersecurity
Published: 12/23/2015
Authors: Michael D Hogan, Elaine M Newton
Abstract: This report sets out proposed United States Government (USG) strategic objectives for pursuing the development and use of international standards for cybersecurity and makes recommendations to achieve those objectives. The recommendations cover inte ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919770

6. Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8074 Volume 2
Topic: Cybersecurity
Published: 12/23/2015
Authors: Michael D Hogan, Elaine M Newton
Abstract: This report provides background information and analysis in support of NISTIR 8074 Volume 1, Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. It provides a curr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919771

7. Third-Party Software's Trust Quagmire
Topic: Cybersecurity
Published: 12/18/2015
Authors: Jeffrey Mark Voas, George Hurlburt
Abstract: Integrating software developed by third-party organizations into a larger system raises concerns about the software's quality, origin, functionality, security, and interoperability. Addressing these concerns requires rethinking the roles of software' ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917802

8. An Industrial Control System Cybersecurity Performance Testbed
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8089
Topic: Cybersecurity
Published: 12/10/2015
Authors: Richard Candell, Timothy Aaron Zimmerman, Keith A Stouffer
Abstract: The National Institute of Standards and Technology (NIST) is developing a cybersecurity performance testbed for industrial control systems. The goal of the testbed is to measure the performance of industrial control systems (ICS) when instrumente ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919407

9. Tailoring Security Controls for Industrial Control Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/16/2015
Authors: Victoria Y Pillitteri, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST SP 800-82, Rev 2: Guide to Industrial Control Systems (ICS) Security written by Keith Stouffer, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams and Adam Hahn. The publication provides ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919782

10. Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations [including updates as of 09-03-2015]
Series: Special Publication (NIST SP)
Report Number: 800-171
Topic: Cybersecurity
Published: 10/1/2015
Authors: Ronald S Ross, Kelley L Dempsey, Patrick Viscuso, Mark Riddle, Gary Guissanie
Abstract: [Supersedes SP 800-171 (June 2015, updated 1/14/2016): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920191] The protection of Controlled Unclassified Information (CUI) while residing in nonfederal information systems and organizations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919562



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series