NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 171 to 180 of 221 records.
Resort by: Date / Title


171. Security Considerations in the System Development Life Cycle
Series: Special Publication (NIST SP)
Report Number: 800-64rev2
Topic: Cybersecurity
Published: 10/16/2008
Authors: Kevin Mcguire Stine, Richard L Kissel, Matthew A Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
Abstract: The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890097

172. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121
Topic: Cybersecurity
Published: 9/30/2008
Authors: Karen Ann Scarfone, John Padgette
Abstract: Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks. It has been integrated into many types of business and consumer devices, including cel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890066

173. Technical Guide to Information Security Testing and Assessment
Series: Special Publication (NIST SP)
Report Number: 800-115
Topic: Cybersecurity
Published: 9/30/2008
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies. The guide provides practical recommendations for desig ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152164

174. Evidence-Based, Good Enough, and Open
Topic: Cybersecurity
Published: 8/4/2008
Author: Karen Ann Scarfone
Abstract: One of the holy grail questions in computer security is how secure are my organization systems? This paper describes our new approach to answering this question. This approach is distinguished from previous efforts in three ways: 1) uses evide ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890007

175. Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories AND Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories
Series: Special Publication (NIST SP)
Report Number: 800-60 Rev1
Topic: Cybersecurity
Published: 8/1/2008
Authors: Kevin Mcguire Stine, Richard L Kissel, J Fahlsing, Jessica Gulick
Abstract: Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and information systems collected or maintain ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152106

176. Guide to General Server Security
Series: Special Publication (NIST SP)
Report Number: 800-123
Topic: Cybersecurity
Published: 7/25/2008
Authors: Karen Ann Scarfone, Wayne Jansen, Tracy Miles
Abstract: The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The docume ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890008

177. Guide to Securing Legacy IEEE 802.11 Wireless Networks [NIST SP (800-48 Revision 1)]
Series: Special Publication (NIST SP)
Report Number: 800-48Rev1
Topic: Cybersecurity
Published: 7/25/2008
Authors: Karen Ann Scarfone, D. Dicoi, Matt Sexton, Cyprus Tibbs
Abstract: The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890006

178. An Attack Graph Based Probabilistic Security Metric
Topic: Cybersecurity
Published: 7/21/2008
Authors: Lingyu Wang, Anoop Singhal
Abstract: In today's networked environments, protecting critical resources usually requires us to understand and measure the likelihood of multi-step attacks that combine different vulnerabilities for reaching the attack goal.  Such a measurement is n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152107

179. Web Services Security: Techniques and Challenges
Topic: Cybersecurity
Published: 7/21/2008
Author: Anoop Singhal
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152155

180. Security Measurement Guide for Information Technology Systems
Series: Special Publication (NIST SP)
Report Number: 800-55rev1
Topic: Cybersecurity
Published: 7/16/2008
Authors: Elizabeth Chew, Marianne Swanson, Kevin Mcguire Stine, N Bartol, Anthony Brown, W Robinson
Abstract: This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional secur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152183



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series