NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 171 to 180 of 228 records.
Resort by: Date / Title


171. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901171

172. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Topic: Cybersecurity
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171

173. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

174. Guidelines on Cell Phone and PDA Security
Series: Special Publication (NIST SP)
Report Number: 800-124
Topic: Cybersecurity
Published: 11/3/2008
Authors: Wayne Jansen, Karen Ann Scarfone
Abstract: [Superseded by SP 800-124 Rev. 1 (June 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913427] Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and relat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890048

175. Security Considerations in the System Development Life Cycle
Series: Special Publication (NIST SP)
Report Number: 800-64 Rev 2
Topic: Cybersecurity
Published: 10/16/2008
Authors: Richard L Kissel, Kevin Mcguire Stine, Matthew A Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
Abstract: The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890097

176. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121
Topic: Cybersecurity
Published: 9/30/2008
Authors: Karen Ann Scarfone, John Padgette
Abstract: [Superseded by SP 800-121 Rev. 1 (June 2012): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911133] Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wirel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890066

177. Technical Guide to Information Security Testing and Assessment
Series: Special Publication (NIST SP)
Report Number: 800-115
Topic: Cybersecurity
Published: 9/30/2008
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies. The guide provides practical recommendations for desig ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152164

178. Evidence-Based, Good Enough, and Open
Topic: Cybersecurity
Published: 8/4/2008
Author: Karen Ann Scarfone
Abstract: One of the holy grail questions in computer security is how secure are my organization systems? This paper describes our new approach to answering this question. This approach is distinguished from previous efforts in three ways: 1) uses evide ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890007

179. Guide for Mapping Types of Information and Information Systems to Security Categories (2 vols.)
Series: Special Publication (NIST SP)
Report Number: 800-60 Rev 1
Topic: Cybersecurity
Published: 8/1/2008
Authors: Kevin Mcguire Stine, Richard L Kissel, William C Barker, Annabelle Lee, J Fahlsing, Jessica Gulick
Abstract: Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and information systems collected or maintain ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152106

180. Guide to General Server Security
Series: Special Publication (NIST SP)
Report Number: 800-123
Topic: Cybersecurity
Published: 7/25/2008
Authors: Karen Ann Scarfone, Wayne Jansen, Miles C. Tracy
Abstract: The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The docume ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890008



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series