NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 21 to 30 of 248 records.
Resort by: Date / Title


21. Small and Medium-size Business Information Security Outreach Program
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/13/2014
Authors: Richard L Kissel, Kim Quill, Chris Johnson
Abstract: Small and medium-sized businesses (SMBs) represent 99.7 percent of all U.S. employers and are an important segment of the U.S. economy. These organizations, totaling more than 28.2 million, create over 60 percent of all new U.S. private-sector jobs a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916061

22. A Model Towards Using Evidence from Security Events for Network Attack Analysis
Topic: Cybersecurity
Published: 4/27/2014
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915771

23. United States Federal Employees' Password Management Behaviors ‹ a Department of Commerce case study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7991
Topic: Cybersecurity
Published: 4/8/2014
Authors: Yee-Yin Choong, Mary Frances Theofanos, Hung-Kung Liu
Abstract: Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies and password requirements on how users should generate and maintain their passwords, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914843

24. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

25. SATE V Ockham Sound Analysis Criteria
Topic: Cybersecurity
Published: 3/14/2014
Author: Paul E Black
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915826

26. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

27. An Integrated Detection System Against False Data Injection Attacks in the Smart Grid
Topic: Cybersecurity
Published: 3/4/2014
Authors: Wei Yu, David Wesley Griffith, Linqiang Ge, Sulabh Bhattarai, Nada T Golmie
Abstract: The smart grid is a new type of power grid that will use the advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especiall ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914981

28. Cybersecurity User's Guide to the Guidelines for Smart Grid Cybersecurity (NISTIR 7628 Vol. 1 2010)
Topic: Cybersecurity
Published: 2/28/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: While the NISTIR 7628 document covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an organization's cybersecurity risk management practices. The User's Gui ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915613

29. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476

30. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series