Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

ITL Bulletin

Computer Forensics Guidance

Author(s)
G E. Fisher
This ITL Bulletin describes two projects in the computer forensics arena and provides guidance on the use of the products developed from them. The first project

Security for Private Branch Exchange Systems

Author(s)
David R. Kuhn
This document provides an introduction to security for private branch exchange systems (PBXs). The primary audience is agency system administrators and others

Identifying Critical Patches With ICAT

Author(s)
Peter M. Mell
[For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a

Mitigating Emerging Hacker Threats

Author(s)
Peter M. Mell, John P. Wack
[For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations

Security Implementations of Active Content

Author(s)
Wayne Jansen, Athanasios T. Karygiannis
Active content documents offer several benefits to both the users of these documents and their authors. Java applets, JavaScript, and ActiveX provide more

Securing Web Servers

Author(s)
Peter M. Mell, David F. Ferraiolo
This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their

The Advanced Encryption Standard: A Status Report

Author(s)
Elizabeth B. Lennon
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect

Measurement and Standards for Computational Science and Engineering

Author(s)
Ronald F. Boisvert, J L. Blue, Daniel W. Lozier, William F. Mitchell, Roldan Pozo, Michael J. Donahue, Donald G. Porter
This report describes current work within ITL on the development of measurement and standards technology to improve the practice of computational science and

Information Security and the World Wide Web (WWW)

Author(s)
Shirley M. Radack
This bulletin discusses some of the vulnerabilities and threats to information security that organizations may experience in their use of the Internet and the

Internet Electronic Mail

Author(s)
Barbara Guttman, Robert H. Bagwill, Elizabeth B. Lennon
This ITL Bulletin summarizes a chapter of the draft Internet Security Policy: A Technical Guide. It describes email protocols, organization email policy, email