NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 201 to 210 of 228 records.
Resort by: Date / Title


201. Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management
Topic: Cybersecurity
Published: 6/3/2014
Authors: Kelley L Dempsey, Ronald S Ross, Kevin Mcguire Stine
Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, int ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916095

202. Surviving Insecure IT: Effective Patch Management
Topic: Cybersecurity
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901613

203. Targeted Search: Reducing the Time and Cost for Searching for Objects in Multi-Server Networks
Topic: Cybersecurity
Published: 4/9/2006
Author: Allen L Roginsky
Abstract: In many applications - including P2P file sharing, content distribution networks, and grid computing - a single object will be searched for in multiple servers. In this paper, we find the provably optimal search method for such applications and deve ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150231

204. Taxonomic Rules for Password Policies: Translating the Informal to the Formal Language
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7970
Topic: Cybersecurity
Published: 12/9/2013
Authors: Kevin Killourhy, Yee-Yin Choong, Mary Frances Theofanos
Abstract: A password policy may seem formal in the sense that it is written in a legalistic language, giving the impression of a binding contract. However, such policies are informal in the logical sense that the policy statements are not written in a clear, u ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914627

205. Technical Guide to Information Security Testing and Assessment
Series: Special Publication (NIST SP)
Report Number: 800-115
Topic: Cybersecurity
Published: 9/30/2008
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies. The guide provides practical recommendations for desig ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152164

206. The Advanced Encryption Standard: A Status Report
Topic: Cybersecurity
Published: 8/25/1999
Author: Elizabeth B Lennon
Abstract: In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal Information, in furtherance of NIST's statutory responsibilit ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151670

207. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Cybersecurity
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

208. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

209. The Future of Cybersecurity Education
Topic: Cybersecurity
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917265

210. The Importance of Entropy to Information Security
Topic: Cybersecurity
Published: 2/3/2014
Authors: Apostol T Vassilev, Timothy Hall
Abstract: The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915121



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series