NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 181 to 190 of 228 records.
Resort by: Date / Title


181. Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/24/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905108

182. Securely Connecting the World with Cyber Security Standards
Topic: Cybersecurity
Published: 10/1/2004
Authors: Alicia Clay Jones, Michael D Hogan
Abstract: This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are nece ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150423

183. Securing America‰s Digital Infrastructure Through Education
Topic: Cybersecurity
Published: 12/14/2012
Author: William D Newhouse
Abstract: This article provides an overview of the establishment of the National Initiative for Cybersecurity Education (NICE), its government structure, and it goals. Parallels are drawn between the strategic R&D thrust, Developing Scientific Foundations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912106

184. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Cybersecurity
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

185. Security Automation from a NIST Perspective
Topic: Cybersecurity
Published: 10/21/2011
Authors: John Franklin Banghart, Stephen D Quinn, Kevin Mcguire Stine
Abstract: Security automation can harmonize the vast amounts of information technology (IT) data into coherent, comparable information streams that inform timely and active management of diverse IT systems. Through the creation of internationally recognized, f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909291

186. Security Considerations in the System Development Life Cycle
Series: Special Publication (NIST SP)
Report Number: 800-64 Rev 2
Topic: Cybersecurity
Published: 10/16/2008
Authors: Richard L Kissel, Kevin Mcguire Stine, Matthew A Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
Abstract: The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890097

187. Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities
Topic: Cybersecurity
Published: 10/1/2002
Author: Elizabeth B Lennon
Abstract: : Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150702

188. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7788
Topic: Cybersecurity
Published: 8/1/2011
Authors: Anoop Singhal, Xinming Ou
Abstract: Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907935

189. Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/13/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911947

190. Service Model Driven Variations in Security Measures for Cloud Environments
Topic: Cybersecurity
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series