NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 21 to 30 of 118 records.
Resort by: Date / Title


21. Cryptographic Key Management Issues & Challenges in Cloud Services
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7956
Topic: Cybersecurity
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
Abstract: To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services - Infrastructure as a Service ( ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914304

22. Cybersecurity User's Guide to the Guidelines for Smart Grid Cybersecurity (NISTIR 7628 Vol. 1 2010)
Topic: Cybersecurity
Published: 2/28/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: While the NISTIR 7628 document covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an organization's cybersecurity risk management practices. The User's Gui ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915613

23. Encryption Basics
Topic: Cybersecurity
Published: 5/2/2011
Authors: Kevin Mcguire Stine, Quynh H Dang
Abstract: Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure its confidentiality. To provide this protection, these professionals frequently look to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908084

24. Establishing a Computer Security Incident Response Capability (CSIRC)
Series: Special Publication (NIST SP)
Report Number: 800-3
Topic: Cybersecurity
Published: 11/1/1991
Author: John P Wack
Abstract: [Superseded by SP 800-61 (January 2004): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151291] Government agencies and other organizations have begun to augment their computer security efforts because of increased threats to computer s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890074

25. Exposing Software Security and Availability Risks For Commercial Mobile Devices
Topic: Cybersecurity
Published: 6/21/2013
Authors: Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeffrey Mark Voas
Abstract: In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including librar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911971

26. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385

27. Fuzz Testing for Software Assurance
Topic: Cybersecurity
Published: 3/1/2015
Authors: Vadim Okun, Elizabeth Nee nee Fong
Abstract: Fuzz Testing, or fuzzing, is a software testing technique that involves providing invalid, unexpected, or random test inputs to the software system under test. The system is then monitored for crashes and other undesirable behavior. Fuzz testing can ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917432

28. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918252

29. Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist
Series: Special Publication (NIST SP)
Report Number: 800-69
Topic: Cybersecurity
Published: 9/29/2006
Authors: Karen Kent Scarfone, Murugiah P Souppaya, John Connor
Abstract: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50890

30. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 6/10/2014
Author: Ronald S Ross
Abstract: This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series