NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 201 to 210 of 248 records.
Resort by: Date / Title


201. Securing America‰s Digital Infrastructure Through Education
Topic: Cybersecurity
Published: 12/14/2012
Author: William D Newhouse
Abstract: This article provides an overview of the establishment of the National Initiative for Cybersecurity Education (NICE), its government structure, and it goals. Parallels are drawn between the strategic R&D thrust, Developing Scientific Foundations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912106

202. Security Assurance Levels: A Vector Approach to Describing Security Requirements
Series: OTHER
Topic: Cybersecurity
Published: 10/20/2010
Authors: James D Gilsinn, Ragnar Schierholz
Abstract: Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and saf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906330

203. Security Automation from a NIST Perspective
Topic: Cybersecurity
Published: 10/21/2011
Authors: John Franklin Banghart, Stephen D Quinn, Kevin Mcguire Stine
Abstract: Security automation can harmonize the vast amounts of information technology (IT) data into coherent, comparable information streams that inform timely and active management of diverse IT systems. Through the creation of internationally recognized, f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909291

204. Security Considerations in the System Development Life Cycle
Series: Special Publication (NIST SP)
Report Number: 800-64 Rev 2
Topic: Cybersecurity
Published: 10/16/2008
Authors: Richard L Kissel, Kevin Mcguire Stine, Matthew A Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
Abstract: The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890097

205. Security Patches and the CVE Vulnerability Naming Scheme: Tools to Address Computer System Vulnerabilities
Topic: Cybersecurity
Published: 10/1/2002
Author: Elizabeth B Lennon
Abstract: : Today more than ever, timely response to vulnerabilities is critical to maintain the operational availability, confidentiality, and integrity of information technology (IT) systems. To assist federal agencies and industry respond to vulnerabilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150702

206. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7788
Topic: Cybersecurity
Published: 8/1/2011
Authors: Anoop Singhal, Xinming Ou
Abstract: Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907935

207. Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/13/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911947

208. Service Model Driven Variations in Security Measures for Cloud Environments
Topic: Cybersecurity
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131

209. Small Business Information Security: the Fundamentals
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7621
Topic: Cybersecurity
Published: 10/1/2009
Author: Richard L Kissel
Abstract: For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading partners it is very important. The term Small Enterprise (or Small Organization) is som ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903080

210. Small and Medium-size Business Information Security Outreach Program
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/13/2014
Authors: Richard L Kissel, Kim Quill, Chris Johnson
Abstract: Small and medium-sized businesses (SMBs) represent 99.7 percent of all U.S. employers and are an important segment of the U.S. economy. These organizations, totaling more than 28.2 million, create over 60 percent of all new U.S. private-sector jobs a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916061



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series