An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS)
David Cooper, William Polk, Andrew Regenscheid, Murugiah Souppaya
This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
David W. Allen, Edward A. Early, Benjamin K. Tsai, Catherine C. Cooksey
This document describes measurement services, instrumentation, and measurement techniques for regular spectral transmittance over the spectral range from 250 nm
The purpose of Special Publication 800-39 is to provide guidance for an integrated, organization-wide program for managing information security risk to
Elizabeth N. Fong, Paul E. Black, Michael J. Kass, Hsiao-Ming M. Koo
Software assurance tools are a fundamental resource to improve assurance in today's software applications. Some tools analyze software requirements or design
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration
David A. Waltermire, Stephen D. Quinn, Karen Scarfone
This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol
Meltem Sonmez Turan, Elaine B. Barker, William E. Burr, Lidong Chen
This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection
Nelson P. Bryner, Anthony D. Putorti Jr., Stephen P. Fuss, Bryan W. Klein
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
Nelson P. Bryner, Anthony D. Putorti Jr., Stephen P. Fuss, Bryan W. Klein
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of
Although there is a great deal of high-quality information available on resilience-related topics hazard assessment, vulnerability assessment, risk assessment
Combinatorial testing can help detect problems like this early in the testing life cycle. The key insight underlying t-way combinatorial testing is that not
Data from the Economic Census provides detailed statistics on the construction industry; however, the data is only gathered every five years. The Bureau of
The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and
Robert E. Chapman, David T. Butry, Allison L. Huang, Douglas S. Thomas
Fire protection measures are needed to maintain the safety and integrity of the Nation s building stock and to limit loss of life and property when building
Kathryn M. Butler, Marc R. Nyden, Rodney A. Bryant
A workshop on respirator sensors was held at the National Institute of Standards and Technology (NIST) on May 1, 2009. The objective of this workshop was to
Lawrence E. Bassham, Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Stefan D. Leigh, M Levenson, M Vangel, Nathanael A. Heckert, D L. Banks
This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many
Stephanie A. Hooker, Christopher N. McCowan, Sunil K. Sinha, Mark Edwards
The NIST-VT workshop identified funding priorities for federal institutions and other funding sources for sustainable water infrastructure systems in order to