Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 4826 - 4850 of 5424

Computer Users' Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental

Executive Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide is designed to help the policy maker address a host of questions regarding the protection and safety of computer systems and data processed within your agency. It introduces information systems security concerns, outlines the management issues

Guide for Selecting Automated Risk Analysis Tools

October 1, 1989
Author(s)
Irene E. Gilbert
This document recommends a process for selecting automated risk analysis tools. It is primarily intended for managers and those responsible for managing risks in computer and telecommunications systems. The document describes important considerations for

Management Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes essential components

Computer Viruses and Related Threats: A Management Guide

August 1, 1989
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides guidance for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. The guidance discusses the combined use of policies

Guide to Auditing for Controls and Security: A System Development Life Cycle Approach

April 1, 1988
Author(s)
Zella G. Ruthberg, Bonnie T. Fisher, William E. Perry, John W. Lainhart, James G. Cox, Mark Gillen, Douglas B. Hunt
This guide addresses auditing the system development life cycle (SDLC) process for an automated information system (AIS), to ensure that controls and security are designed and built into the system. The guide also presents a process for deciding which
Displaying 4826 - 4850 of 5424
Was this page helpful?