Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 51 - 60 of 2154544 documents for půjčky pro slováky Navštivte web na WWWLOAN24HXYZ rychlá pujcka online Vlašim mobilní pujčka na učet online pujcky Kunovice gilmorova děvčata tajnosti a půjčky online podnikatelská půjčka úrok pujcka do vyplaty slozenkou půjčka bez doložení příjmu a bez registru online nové pujcky pred výplatou Chlumec nad Cidlinou online pujcka pred výplatou Hrádek nad Nisou rychla pujcka online Bystřice pod Hostýnem zarucena pujcka o vikendu ihned pujčka 5000 do hodiny nebankovní pujcky online Šumperk
Relevance
Date
  1. Informative References

    https://www.nist.gov/cyberframework/informative-references
    The National Cybersecurity Online Informative References Program is a NIST effort to facilitate subje
  2. PowerPoint Presentation

    https://csrc.nist.gov/CSRC/media/Presentations/FISSEA-2013-UNINTENTIONAL-OVERSHARING-OF-INFORMA/images-media/fissea_conf_2013_paullet.pdf
    Karen L. Paullet, DSc UNINTENTIONAL OVERSHARING OF INFORMATION I have hit “Reply All” to an email that was intended for one recipient and shared information that I should not have. When attaching a document, photo, or other file to an email, I have sent the incorrect attachment and shared information that I should not have. When sending or replying to a text message I have sent personal information to the wrong person. I keep notes on my cell phone/smart phone which contain personal information such as pin numbers, passwords, or bank account information. I am unable to remember all of my passwords so I keep them in a notebook or spreadsheet. I connect to publicly available WiFi and transmit personal information such as ...
  3. CFP Panel Presentation June 2009

    https://www.nist.gov/system/files/documents/itl/vote/Hughes.ppt
    Page * June 2009 Internet Voting Panel - CFP Conference – OVF Presentation May 15, 2008 OVF Solutions Tour and Demonstration Daemmon Hughes, Technology Program Manager Overseas Vote Foundation www.overseasvotefoundation.org - Voter Services for UOCAVA Voters- Common Data Format Workshop * * No name Good Morning, a pleasure to be here, on the cusp of a great election – and with all of you who have every thing to do with making it all happen. Turning point day – one of those first-ever days. Break through. Page * Mission/Work and Profile Facilitate and increase participation of overseas and military citizens in elections by providing secure and innovative web-based services 501c3, nonpartisan, professionally-staffed, volunteer-supported Responsible uses of ...
  4. Join Us NEXT WEEK at RSA to Discuss How Privacy Enhancing Technologies Can Secure Identity Online

    https://www.nist.gov/blogs/cybersecurity-insights/join-us-next-week-rsa-discuss-how-privacy-enhancing-technologies-can
    Join the National Program Office’s Senior Privacy Policy Advisor Naomi Lefkovitz at the RSA Conference in San Francisco on Wednesday, February 26, from 8AM-9AM PST to discuss enhanced privacy as a critical element of building trusted interaction online, the use of privacy-enhancing technology (PET) solutions, and challenges of commercial viability for PETs in identity systems....
  5. NIST Special Publication XXX

    https://www.nist.gov/system/files/documents/2019/05/07/draft2-nist-sp-500-267ar1_1.pdf
    May 2019 - Revision 1, 2nd DRAFT – for public review and comment. NIST Special Publication 500-267Ar1 Revision 1 NIST IPv6 Profile Doug Montgomery Mark Carson Sheila Frankel Timothy Winters Michayla Newcombe Timothy Carlin This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.500-267Ar1 May 2019 - Revision 1, 2nd DRAFT – for public review and comment. NIST Special Publication 500-267Ar1 Revision 1 NIST IPv6 Profile Doug Montgomery Mark Carson Sheila Frankel Information Technology Laboratory National Institute of Standards and Technology Timothy Winters Michayla Newcombe Timothy Carlin InterOperability Laboratory University of New Hampshire This...
  6. Security Recommendations

    https://www.nist.gov/itl/voting/security-recommendations
    READ-ONLY SITE MATERIALS: Historical voting TWiki site (2015-2020) ARCHIVED
  7. Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor Implementations for Purchasers

    https://www.nccoe.nist.gov/sites/default/files/library/sp1800/cr-mfa-nist-sp1800-17b.pdf
    NIST SPECIAL PUBLICATION 1800-17B Multifactor Authentication for E-Commerce Risk-Based, FIDO Universal Second Factor Implementations for Purchasers Volume B: Approach, Architecture, and Security Characteristics William Newhouse Information Technology Laboratory National Institute of Standards and Technology Brian Johnson Sarah Kinling Blaine Mulugeta Kenneth Sandlin The MITRE Corporation McLean, VA August 2018 DRAFT This publication is available free of charge from: https://nccoe.nist.gov/projects/use-cases/multifactor-authentication-ecommerce DRAFT NIST SP 1800-17B: Multifactor Authentication for E-Commerce i DISCLAIMER Certain commercial entities, equipment, products, or materials may be identified in this...
  8. Creating More Options to Improve Privacy and Security Online

    https://www.nist.gov/blogs/cybersecurity-insights/creating-more-options-improve-privacy-and-security-online
    It’s well established that diversity of thought and backgrounds strengthens organizations of all kinds and that diversity is a key component of a strong economy. At the National Strategy for Trusted Identities in Cyberspace [8] (NSTIC) National Program Office (NPO), we believe diversity is also the key to establishing a vibrant marketplace of options to replace outdated passwords with reliably secure, privacy-enhancing and convenient ways to prove who you are online....
  9. FISSEA Conference 2011 Presentation - Securing the Weakest Link

    https://csrc.nist.gov/CSRC/media/Presentations/FISSEA-Conference-2011-Presentation-Securing-the/images-media/March17_FISSEA-Securing-Weakest-Link-JFerron.pdf
    Securing the Weakest Link © 2010 Global Knowledge Training LLC. All rights reserved. Instructor Jay Ferron CEHI, CISM, CISSP, CWSP, MCITP, MCT, MVP, NSA-IAM … jayson.ferron@globalknowledge.com © 2010 Global Knowledge Training LLC. All rights reserved. Section Objectives After completing this section, you will be able to:  Discuss the issue of social media in security  Describe and show examples of phishing  Show methods of discovering and processing online attacks 2-2 © 2010 Global Knowledge Training LLC. All rights reserved. Security Importance  To protect your finances  To protect your data  To protect your country  To protect your job  To protect your way of life  To protect your life Security Fundamentals 1-3 © 2010...
Showing results 51 - 60 of 2154544 documents for půjčky pro slováky Navštivte web na WWWLOAN24HXYZ rychlá pujcka online Vlašim mobilní pujčka na učet online pujcky Kunovice gilmorova děvčata tajnosti a půjčky online podnikatelská půjčka úrok pujcka do vyplaty slozenkou půjčka bez doložení příjmu a bez registru online nové pujcky pred výplatou Chlumec nad Cidlinou online pujcka pred výplatou Hrádek nad Nisou rychla pujcka online Bystřice pod Hostýnem zarucena pujcka o vikendu ihned pujčka 5000 do hodiny nebankovní pujcky online Šumperk