An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Kelley L. Dempsey, Victoria Yan Pillitteri, Chad Baer, Robert Niemeyer, Ron Rudman, Susan Urban
This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental organizations and commercial
James J. McCarthy, Lauren Acierto, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne
Industrial control systems (ICS) compose a core part of our nations critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide
Kayla Ibrahim, Suryadipta Majumdar, Daniel Bastos, Anoop Singhal
Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that use IoT devices (e.g., an arson that uses a smart oven, burglary via a smart lock). Therefore, the
Moneer M. Helu, Timothy A. Sprock, Daniel Hartenstine, Rishabh Venketesh, William Sobel
Managing manufacturing data remains challenging despite the growth of the Industrial Internet of Things (IIoT). While various standards and technologies enable greater access to data, scaling data processing and distribution can be difficult given the
Combination coverage based testing supplements basic structural coverage based test selection. This provides a sound test engineering method with defensible, quantitative measures of test completeness.
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against terrorist and disaster incidents. In order to meet the threat demands, public safety
Since 9/11, the Department of Homeland Security has provided over $16 billion dollars in grant assistance to secure cities and non-profit organizations against terrorist and disaster incidents. In order to meet the threat demands, public safety
Michelle P. Steves, Mary Theofanos, Yee-Yin Choong, Shanee Dawkins, Susanne M. Furman, Kristen K. Greene, Sandra Spickard Prettyman
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community has a unique opportunity to review and improve communication technology for first responders, 9 1 1 communications, emergency medical services (EMS)
NIST Special Publication (SP) 800-140E replaces the approved authentication mechanism requirements of ISO/IEC 19790 Annex E. As a validation authority, the Cryptographic Module Validation Program (CMVP) may supersede this Annex in its entirety with its own
NIST Special Publication (SP) 800-140F replaces the approved non-invasive attack mitigation test metric requirements of ISO/IEC 19790 Annex F. As a validation authority, the Cryptographic Module Validation Program (CMVP) may supersede this Annex in its
NIST Special Publication (SP) 800-140C replaces the approved security functions of ISO/IEC 19790 Annex C. As a validation authority, the Cryptographic Module Validation Program (CMVP) may supersede this Annex in its entirety. This document supersedes ISO
NIST Special Publication (SP) 800-140D replaces the approved sensitive security parameter generation and establishment methods requirements of ISO/IEC 19790 Annex D. As a validation authority, the Cryptographic Module Validation Program (CMVP) may
NIST Special Publication (SP) 800-140A modifies the vendor documentation requirements of ISO/IEC 19790 Annex A. As a validation authority, the Cryptographic Module Validation Program (CMVP) may modify, add or delete Vendor Evidence (VE) and/or Test
NIST Special Publication (SP) 800-140B is to be used in conjunction with ISO/IEC 19790 Annex B and ISO/IEC 24759 6.14. The special publication modifies only those requirements identified in this document. SP 800-140B also specifies the content of the
NIST Special Publication (SP) 800-140 specifies the Derived Test Requirements (DTR) for Federal Information Processing Standard (FIPS) 140-3. SP 800-140 modifies the test (TE) and vendor (VE) evidence requirements of International Organization for
Kristen Greene, Shanee T. Dawkins, Sandra S. Prettyman, Pamela J. Konkol, Mary F. Theofanos, Kevin C. Mangold, Susanne M. Furman, Michelle P. Steves
With the newly created Nationwide Public Safety Broadband Network (NPSBN), the public safety community is in the process of supplementing the use of land mobile radios (LMR) to a technology ecosystem that will include a variety of new communication tools
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Advanced Persistent Threats (APT) has become the concern of many enterprise networks. APT can remain undetected for a long time span and lead to undesirable consequences such as stealing of sensitive data, broken workflow, and so on. To achieve the attack
Yee-Yin Choong, Mary F. Theofanos, Karen Renaud, Suzanne Prior
Children use technology from a very young age, and often have to authenticate. The goal of this study is to explore childrens practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the worlds cyber posture and
A summary and overview of a public workshop on machine learning for optical Communication systems held on August 2nd 2019, by the Communications Technology Laboratory at the National Institute of Standards and Technology in Boulder, CO.
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and
Paul A. Grassi, James L. Fenton, Elaine M. Newton, Ray Perlner, Andrew Regenscheid, William E. Burr, Justin P. Richer, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of
Paul A. Grassi, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and
Paul A. Grassi, Justin P. Richer, Sarah K. Squire, James L. Fenton, Ellen M. Nadeau, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication
David R. Kuhn, Raghu N. Kacker, Yu Lei, Dimitris Simos
Testing is the most commonly used approach for software assurance, yet it remains as much judgement and art as science. Structural coverage adds some rigor to the process by establishing formally defined criteria for some notion of test completeness, but