Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 31 - 40 of 1053466 documents for instagram batmanapollo
Relevance
Date
  1. Domain Name System-Based Electronic Mail Security

    https://www.nccoe.nist.gov/sites/default/files/library/sp1800/dns-secure-email-nist-sp1800-6b.pdf
    NIST SPECIAL PUBLICATION 1800-6B Domain Name System-Based Electronic Mail Security Volume B: Approach, Architecture, and Security Characteristics Scott Rose Information Technology Laboratory National Institute of Standards and Technology William Barker Dakota Consulting Silver Spring, MD Santos Jha Chinedum Irrechukwu The MITRE Corporation McLean, VA Karen Waltermire National Cybersecurity Center of Excellence National Institute of Standards and Technology January 2018 This publication and its additional content is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-6 NIST SP 1800-6B: Domain Name System-Based Electronic Mail Security i This publication is available free of charge from : https://doi.org/10.6028/N IST.SP.1800-6. DISCLAIMER Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. National Institute of Standards and Technolo...
  2. Microsoft PowerPoint - Going Deeper and Deeper into Cell Phones - NIST 2019.pptx

    https://www.nist.gov/system/files/documents/2020/08/21/Going%20%20Deeper%20and%20Deeper%20into%20Cell%20Phones%20-%20NIST%202019.pdf
                                  Going deeper and deeper into Cell Phones Jenise Reyes‐Rodriguez Software and Systems Division, ITL NIST November 13, 2019 Welcome to NIST!                                                                                                      Computer Forensic Tool Testing • Provides a measure of assurance that the tools used in the investigations of computer‐related crimes produce valid results. • Established around year 2000 • Develop a specification for analyzing mobile device memory/binary dumps and to support the admissibility of forensic data in court by providing the law enforcement community testing information Onboarding 11/13/2019                 Evolution of Cell phones Some time ago… Contacts Call Logs Text Messages/SMS Onboarding 11/13/2019                                 More current cell phones Up to this day… Contacts Calendar entries MMS Emails Browser history Call Logs Text Messages/SMS Media files (audio, pictures, video) Notes/Memos Apps GPS Deleted data Damaged devices Onboarding 11/13/201...
  3. https://bigdatawg.nist.gov/_uploadfiles/m0048_v1_2526614644.docx

    https://bigdatawg.nist.gov/_uploadfiles/M0048_v1_2526614644.docx
    NBD (NIST Big Data) Requirements WG Use Case – Privacy use case/requirements for Social Networking Use Case Title Privacy requirements for Social Networking Vertical Commercial Cloud Consumer or enterprise Services Author/Company Babak Jahromi/Microsoft Co. Actors/Stakeholders and their roles and responsibilities Cloud Providers providing consumer or enterprise-grade social networking services (e.g. Facebook, Yammer) or cloud telecom operator offering text messaging services (e.g. Skype, Twitter or cellular phone operators), Client user (consumer or enterprise) producing social media data that can be analyzed and aggregated by the cloud providers (including telecom operator acing as cloud provider) as well as 3rd party data warehousing players Goals Protect the privacy of users as they generate social media information that could be used., analyzed, and aggregated by providers and others for purposes of advertising, product placement, profiling, etc. Use Case Description Users interact with cloud-based social media services, generating large, fast and loosely structured Big Data that can be collected, aggregated and analyzed by cloud providers or their partners using Big Data techniques. An essential ...
  4. https://bigdatawg.nist.gov/_uploadfiles/m0049_v1_6287217610.docx

    https://bigdatawg.nist.gov/_uploadfiles/M0049_v1_6287217610.docx
    NBD (NIST Big Data) Requirements WG Use Case – Privacy use case/requirements for Social Networking Use Case Title Privacy requirements for Social Networking Vertical Commercial Cloud Consumer or enterprise Services Author/Company Babak Jahromi/Microsoft Co. Actors/Stakeholders and their roles and responsibilities Cloud Providers providing consumer or enterprise-grade social networking services (e.g. Facebook, Yammer) or cloud telecom operator offering text messaging services (e.g. Skype, Twitter or cellular phone operators), Client user (consumer or enterprise) producing social media data that can be analyzed and aggregated by the cloud providers (including telecom operator acing as cloud provider) as well as 3rd party data warehousing players Goals Protect the privacy of users as they generate social media information that could be used., analyzed, and aggregated by providers and others for purposes of advertising, product placement, profiling, etc. Use Case Description Users interact with cloud-based social media services, generating large, fast and loosely structured Big Data that can be collected, aggregated and analyzed by cloud providers or their partners using Big Data techniques. An essential ...
  5. https://nvd.nist.gov/feeds/xml/cve/1.2/nvdcve-2014.xml.gz

    https://nvd.nist.gov/feeds/xml/cve/1.2/nvdcve-2014.xml.gz
    https://nvd.nist.gov/feeds/xml/cve/1.2/nvdcve-2014.xml Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string. http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64 RHSA-2014:0164 RHSA-2014:0173 RHSA-2014:0186 RHSA-2014:0189 52161 GLSA-201409-04 MDVSA-2014:029 65298 1029708 https://bugzilla.redhat.com/show_bug.cgi?id=1054592 mysql-cve20140001-bo(90901) https://mariadb.com/kb/en/mariadb-5535-changelog/ ...
  6. CSRC Topic: program management | CSRC

    https://csrc.nist.gov/Topics/Security-and-Privacy/security-programs-and-operations/program-management
    Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations.
  7. CSRC Topic: smart grid | CSRC

    https://csrc.nist.gov/Topics/Sectors/energy/smart-grid
    Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations.
  8. CSRC Topic: BIOS | CSRC

    https://csrc.nist.gov/Topics/Technologies/BIOS
    Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations.
  9. CSRC Topic: digital signatures | CSRC

    https://csrc.nist.gov/Topics/Security-and-Privacy/cryptography/digital-signatures
    Use these CSRC Topics to identify and learn more about NIST's cybersecurity Projects, Publications, News, Events and Presentations.
Showing results 31 - 40 of 1053466 documents for instagram batmanapollo