NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 191 to 200 of 239 records.
Resort by: Date / Title


191. Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/24/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905108

192. Securely Connecting the World with Cyber Security Standards
Topic: Cybersecurity
Published: 10/1/2004
Authors: Alicia Clay Jones, Michael D Hogan
Abstract: This paper focuses on some of the key roles that cyber security standards play in securely connecting our cyber world. Cyber security standards can be categorized as technical, management, or testing standards. All three types of standards are nece ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150423

193. Securing America‰s Digital Infrastructure Through Education
Topic: Cybersecurity
Published: 12/14/2012
Author: William D Newhouse
Abstract: This article provides an overview of the establishment of the National Initiative for Cybersecurity Education (NICE), its government structure, and it goals. Parallels are drawn between the strategic R&D thrust, Developing Scientific Foundations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912106

194. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Cybersecurity
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

195. Security Automation from a NIST Perspective
Topic: Cybersecurity
Published: 10/21/2011
Authors: John Franklin Banghart, Stephen D Quinn, Kevin Mcguire Stine
Abstract: Security automation can harmonize the vast amounts of information technology (IT) data into coherent, comparable information streams that inform timely and active management of diverse IT systems. Through the creation of internationally recognized, f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909291

196. Security Considerations in the System Development Life Cycle
Series: Special Publication (NIST SP)
Report Number: 800-64 Rev 2
Topic: Cybersecurity
Published: 10/16/2008
Authors: Richard L Kissel, Kevin Mcguire Stine, Matthew A Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
Abstract: The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890097

197. Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities
Topic: Cybersecurity
Published: 10/1/2002
Author: Elizabeth B Lennon
Abstract: : Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150702

198. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7788
Topic: Cybersecurity
Published: 8/1/2011
Authors: Anoop Singhal, Xinming Ou
Abstract: Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907935

199. Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/13/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911947

200. Service Model Driven Variations in Security Measures for Cloud Environments
Topic: Cybersecurity
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series