NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: date

Displaying records 21 to 30 of 252 records.
Resort by: Date / Title


21. NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure
Topic: Cybersecurity
Published: 6/2/2014
Author: Victoria Y Pillitteri
Abstract: On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915855

22. NIST's Role in Improving Critical Infrastructure Cybersecurity: Public/Private Teamwork
Topic: Cybersecurity
Published: 6/2/2014
Author: William C Barker
Abstract: National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection aren‰t useful unless adopted, so NIST seeks, while fostering creation of effective cybersecuri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916056

23. Small and Medium-size Business Information Security Outreach Program
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/13/2014
Authors: Richard L Kissel, Kim Quill, Chris Johnson
Abstract: Small and medium-sized businesses (SMBs) represent 99.7 percent of all U.S. employers and are an important segment of the U.S. economy. These organizations, totaling more than 28.2 million, create over 60 percent of all new U.S. private-sector jobs a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916061

24. A Model Towards Using Evidence from Security Events for Network Attack Analysis
Topic: Cybersecurity
Published: 4/27/2014
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915771

25. United States Federal Employees' Password Management Behaviors ‹ a Department of Commerce case study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7991
Topic: Cybersecurity
Published: 4/8/2014
Authors: Yee-Yin Choong, Mary Frances Theofanos, Hung-Kung Liu
Abstract: Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies and password requirements on how users should generate and maintain their passwords, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914843

26. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

27. SATE V Ockham Sound Analysis Criteria
Topic: Cybersecurity
Published: 3/14/2014
Author: Paul E Black
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915826

28. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

29. An Integrated Detection System Against False Data Injection Attacks in the Smart Grid
Topic: Cybersecurity
Published: 3/4/2014
Authors: Wei Yu, David Wesley Griffith, Linqiang Ge, Sulabh Bhattarai, Nada T Golmie
Abstract: The smart grid is a new type of power grid that will use the advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especiall ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914981

30. Cybersecurity User's Guide to the Guidelines for Smart Grid Cybersecurity (NISTIR 7628 Vol. 1 2010)
Topic: Cybersecurity
Published: 2/28/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: While the NISTIR 7628 document covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an organization's cybersecurity risk management practices. The User's Gui ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915613



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series