NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity Sorted by: title

Displaying records 21 to 30 of 132 records.
Resort by: Date / Title


21. Considerations for Identity Management in Public Safety Networks
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8014
Topic: Cybersecurity
Published: 3/30/2015
Authors: Nelson E Hastings, Joshua M Franklin
Abstract: This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their appli ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917650

22. Contingency Planning Guide for Federal Information Systems [including updates through 11/11/2010]
Series: Special Publication (NIST SP)
Report Number: 800-34 Rev 1
Topic: Cybersecurity
Published: 5/30/2010
Authors: Marianne M. Swanson, Pauline Bowen, Amy Wohl Phillips, Dean Gallup, David Lynes
Abstract: This publication assists organizations in understanding the purpose, process, and format of information system contingency planning development through practical, real-world guidelines. This guidance document provides background information on inter ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905266

23. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Topic: Cybersecurity
Published: 12/31/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr, Hildegard Ferraiolo, David A Cooper
Abstract: [Superseded by SP 800-78-4 (May 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918499] This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537

24. Cryptographic Key Management Issues & Challenges in Cloud Services
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7956
Topic: Cybersecurity
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
Abstract: To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services - Infrastructure as a Service ( ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914304

25. Cybersecurity User's Guide to the Guidelines for Smart Grid Cybersecurity (NISTIR 7628 Vol. 1 2010)
Topic: Cybersecurity
Published: 2/28/2014
Authors: Victoria Y Pillitteri, Tanya L Brewer
Abstract: While the NISTIR 7628 document covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an organization's cybersecurity risk management practices. The User's Gui ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915613

26. Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8055
Topic: Cybersecurity
Published: 1/20/2016
Authors: Michael James Bartock, Jeffrey A Cichonski, Murugiah P Souppaya, Paul Fox, Mike Miller, Ryan Holley, Karen Scarfone
Abstract: This report documents proof of concept research for Derived Personal Identity Verification (PIV) Credentials. Smart card-based PIV Cards cannot be readily used with most mobile devices, such as smartphones and tablets, but Derived PIV Credentials (DP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919821

27. Encryption Basics
Topic: Cybersecurity
Published: 5/2/2011
Authors: Kevin Mcguire Stine, Quynh H Dang
Abstract: Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure its confidentiality. To provide this protection, these professionals frequently look to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908084

28. Establishing a Computer Security Incident Response Capability (CSIRC)
Series: Special Publication (NIST SP)
Report Number: 800-3
Topic: Cybersecurity
Published: 11/1/1991
Author: John P Wack
Abstract: [Superseded by SP 800-61 (January 2004): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151291] Government agencies and other organizations have begun to augment their computer security efforts because of increased threats to computer s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890074

29. Exposing Software Security and Availability Risks For Commercial Mobile Devices
Topic: Cybersecurity
Published: 6/21/2013
Authors: Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeffrey Mark Voas
Abstract: In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including librar ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911971

30. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series