NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 121 to 130 of 252 records.
Resort by: Date / Title


121. Introducing the Federal Cybersecurity R&D Strategic Plan
Topic: Cybersecurity
Published: 12/14/2012
Authors: Douglas Maughan, William D Newhouse, Tomas Vagoun
Abstract: In December 2011, the White House Office of Science and Technology Policy (OSTP) released the Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program - a framework for a set of coordinated Federal strateg ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912193

122. Introduction to Public Key Technology and the Federal PKI Infrastructure
Series: Special Publication (NIST SP)
Report Number: 800-32
Topic: Cybersecurity
Published: 2/26/2001
Authors: David R Kuhn, Chung Tong Hu, William T Polk, Shu-jen H Chang
Abstract: This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI func ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151247

123. Introduction: Cybersecurity
Topic: Cybersecurity
Published: 8/31/2010
Author: David R Kuhn
Abstract: Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905995

124. Intrusion Detection and Prevention Systems
Topic: Cybersecurity
Published: 10/22/2010
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901146

125. It's All About The Benjamins: Fair Trade botnets and incentivizing users to ignore security advice
Topic: Cybersecurity
Published: 2/28/2011
Authors: Serge M. (Serge) Egelman, Nicolas Christin, Timothy Vidas, Jens Grossklags
Abstract: We examine the cost for an attacker to pay users to execute arbitrary code---potentially malware. We created an Amazon's Mechanical Turk task wherein users were asked to download and run for an hour an executable we wrote. While this program was ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907421

126. Logic Minimization Techniques with Applications to Cryptology
Topic: Cybersecurity
Published: 4/1/2013
Authors: Joan Boyar, Philip Matthews, Rene C Peralta
Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit { as measured by the number of non-linear gates it contains { is reduced. The second step reduc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908384

127. Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7676
Topic: Cybersecurity
Published: 6/18/2010
Author: David A Cooper
Abstract: NIST Special Publication 800-73-3 introduces the ability to store retired Key Management Keys within the Personal Identity Verification (PIV) Card Application on a PIV Card. This paper complements SP 800-73-3 by providing some of the rationale for t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905913

128. Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/29/2013
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913241

129. Managing Information Security Risk: Organization, Mission, and Information System View
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/22/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission and Information System View. This publication was developed by the Joint Task Force Transf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908207

130. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906396



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series