NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 121 to 130 of 228 records.
Resort by: Date / Title


121. Managing Security: The Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

122. Internet Protocol Version 6 (IPv6): NIST Guidelines Help Organizations Manage the Secure Deployment of the New Network Protocol
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/31/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila Frankel of NIST, Richard Graveman of RFG Security, John Pearce of Booz Allen Hamilton and Mar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907826

123. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Topic: Cybersecurity
Published: 12/31/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr, Hildegard Ferraiolo, David A Cooper
Abstract: This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as the supporting infrastructure specified in FIPS 201 and the related Special Publication 800-73, Interfaces f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537

124. Guidelines for the Secure Deployment of IPv6
Series: Special Publication (NIST SP)
Report Number: 800-119
Topic: Cybersecurity
Published: 12/29/2010
Authors: Sheila E Frankel, Richard Graveman, John Pearce, Mark Rooks
Abstract: Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol, NIST undertook the development of a guide to help educate federal agencies about the possibl ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907211

125. k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks
Topic: Cybersecurity
Published: 12/10/2010
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
Abstract: The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905605

126. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

127. Intrusion Detection and Prevention Systems
Topic: Cybersecurity
Published: 10/22/2010
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901146

128. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode (NIST SP 800-38A)
Series: Special Publication (NIST SP)
Report Number: 800-38
Topic: Cybersecurity
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

129. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Cybersecurity
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

130. In Trust we Trust
Topic: Cybersecurity
Published: 10/14/2010
Authors: Keith Miller, Jeffrey Mark Voas, Phillip Laplante
Abstract: The term trust has had a well understood definition for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a public cloud, the need to reconsider what trust means for a public ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906142



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series