NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 161 to 170 of 220 records.
Resort by: Date / Title


161. Release of NIST Interagency Report 7946, CVSS Implementation Guidance
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/10/2014
Authors: Harold Booth, Joshua M Franklin, Larry Feldman, Greg Witte
Abstract: The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global Vulne ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916242

162. Report on the Static Analysis Tool Exposition (SATE) IV
Series: Special Publication (NIST SP)
Report Number: 500-297
Topic: Cybersecurity
Published: 2/4/2013
Authors: Vadim Okun, Aurelien Michel Dominique Delaitre, Paul E Black
Abstract: The NIST SAMATE project conducted the fourth Static Analysis Tool Exposition (SATE IV) to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912378

163. Report on the Third Static Analysis Tool Exposition (SATE 2010)
Series: Special Publication (NIST SP)
Report Number: 500-283
Topic: Cybersecurity
Published: 10/27/2011
Authors: Vadim Okun, Paul E Black, Aurelien Michel Dominique Delaitre
Abstract: The NIST Software Assurance Metrics And Tool Evaluation (SAMATE) project conducted the third Static Analysis Tool Exposition (SATE) in 2010 to advance research in static analysis tools that find security defects in source code. The main goals of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909407

164. Report: Authentication Diary Study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7983
Topic: Cybersecurity
Published: 2/4/2014
Authors: Michelle Potts Steves, Mary Frances Theofanos
Abstract: Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user IDs and passwords or personal identification numbers (PINs). Many try to use the same passwo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912430

165. Revised Guide Helps Federal Organizations Improve Their Risk Management Practices and Information System Security
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/29/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Developed by NIST in partnership ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905359

166. Revised Guide Helps Organizations Handle Security-Related Incidents
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 800-61 Revision 2, Computer Security Incident Handling Guide. This publication assists organizations in establishing computer security incident response capabi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912387

167. Revised Guideline for Electronic Authentication of Users Helps Organizations Protect the Security of their Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 12/22/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-63-1, Electronic Authentication Guideline. This revised guideline, which supersedes an earlier guideline, NIST SP 800-63, updates information about, and recommend ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910388

168. SATE V Ockham Sound Analysis Criteria
Topic: Cybersecurity
Published: 3/14/2014
Author: Paul E Black
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915826

169. Secure Biometric Match-on-Card Feasibility Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7452
Topic: Cybersecurity
Published: 11/30/2007
Authors: David A Cooper, Trung-Hung Dang, Philip Lee, William I. (William I) MacGregor, Ketan Mehta
Abstract: FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51278

170. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81rev1
Topic: Cybersecurity
Published: 8/27/2010
Author: Ramaswamy Chandramouli
Abstract: This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corporate entity. The deployment guidelines follow from an analysis of security objectives and consequent protection a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series