NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 131 to 140 of 255 records.
Resort by: Date / Title


131. Managing Information Security Risk: Organization, Mission, and Information System View
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/22/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission and Information System View. This publication was developed by the Joint Task Force Transf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908207

132. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906396

133. Managing Security: The Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

134. Managing the Configuration of Information Systems with a Focus on Security
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/26/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NI ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909644

135. Metastability of Fair Bandwidth Sharing Under Fluctuating Demand and Necessity of Flow Admission control
Topic: Cybersecurity
Published: 9/17/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions under random flow arrivals/departures is proposed and discussed. Fluctuations in the numbers of flows in progress cause the network instability even under light load. Th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51233

136. Mobile Application Device Power Usage Measurements
Topic: Cybersecurity
Published: 7/31/2012
Authors: Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey Mark Voas
Abstract: Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911099

137. Mobile-App Addiction: Threat to Security?
Topic: Cybersecurity
Published: 11/1/2011
Authors: George Hurlburt, Jeffrey Mark Voas, Keith Miller
Abstract: Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907101

138. NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure
Topic: Cybersecurity
Published: 6/2/2014
Author: Victoria Y Pillitteri
Abstract: On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915855

139. NIST Test Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7870
Topic: Cybersecurity
Published: 7/12/2012
Author: David A Cooper
Abstract: In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV Cards and a supporting public key infrastructure. This set of test cards includes ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911544

140. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series