Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1676 through 1700 of 4845 matching records.
Publications Journal Article (Final) July 25, 2018
https://csrc.nist.gov/pubs/journal/2018/07/a-survey-of-physicsbased-attack-detection-in-cps/final

Journal: ACM Computing Surveys Abstract: Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements to identify potentially false contro...

Publications ITL Bulletin (Final) June 26, 2018
https://csrc.nist.gov/pubs/itlb/2018/06/a-model-process-for-criticality-analysis/final

Abstract: This bulletin summarizes the information found in NISTIR 8179: Criticality Analysis Process Model, which describes a structured method of prioritizing programs, systems, and components based on their importance to the goals of an organization and the impact that their inadequate operation or loss ma...

Publications SP 800-185 (Final) December 22, 2016
https://csrc.nist.gov/pubs/sp/800/185/final

Abstract: This Recommendation specifies four SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash. cSHAKE is a customizable variant of the SHAKE functions defined in FIPS 202. KMAC (for KECCAK Message Authentication Code) is a variable-length message authentication code algorithm based on KECCAK...

Publications SP 800-38G (Final) August 4, 2016
https://csrc.nist.gov/pubs/sp/800/38/g/upd1/final

Abstract: This Recommendation specifies two methods, called FF1 and FF3, for format-preserving encryption. Both of these methods are modes of operation for an underlying, approved symmetric-key block cipher algorithm.

Publications SP 800-156 (Final) May 20, 2016
https://csrc.nist.gov/pubs/sp/800/156/final

Abstract: This document provides a common XML-based data representation of a chain-of-trust record to facilitate the exchange of Personal Identity Verification (PIV) Card enrollment data. The exchanged record is the basis to personalize a PIV Card for a transferred employee and also for service providers to p...

Publications SP 800-38G (Final) (Withdrawn) March 29, 2016

https://csrc.nist.gov/pubs/sp/800/38/g/final

Abstract: This Recommendation specifies two methods, called FF1 and FF3, for format-preserving encryption. Both of these methods are modes of operation for an underlying, approved symmetric-key block cipher algorithm.

Publications IR 8054 (Final) March 15, 2016
https://csrc.nist.gov/pubs/ir/8054/upd1/final

Abstract: Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), issued by the White House in 2011 to encourage enhanced security, privacy, interoperability, and ease of use for online transactions. This document details summaries and outcomes of NSTIC pilots; in ad...

Publications SP 800-154 (Initial Public Draft) March 14, 2016
https://csrc.nist.gov/pubs/sp/800/154/ipd

Abstract: Threat modeling is a form of risk assessment that models aspects of the attack and defense sides of a particular logical entity, such as a piece of data, an application, a host, a system, or an environment. This publication examines data-centric system threat modeling, which is threat modeling that...

Publications ITL Bulletin (Final) December 15, 2015
https://csrc.nist.gov/pubs/itlb/2015/12/stopping-malware-and-unauthorized-software-through/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication 800-167, "Guide to Application Whitelisting," written by Adam Sedgewick, Murugiah Souppaya and Karen Scarfone. The publication is intended to assist organizations in understanding the basics of application whitelisting....

Publications SP 800-167 (Final) October 28, 2015
https://csrc.nist.gov/pubs/sp/800/167/final

Abstract: An application whitelist is a list of applications and application components that are authorized for use in an organization. Application whitelisting technologies use whitelists to control which applications are permitted to execute on a host. This helps to stop the execution of malware, unlicensed...

Publications Book Section (Final) July 3, 2015
https://csrc.nist.gov/pubs/book-section/2015/07/common-biometric-exchange-formats-framework-standa/final

In: Encyclopedia of Biometrics Abstract: Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). CBEFF permits considerable flexibility regarding BIR structures...

Publications IR 8054 (Final) (Withdrawn) April 13, 2015

https://csrc.nist.gov/pubs/ir/8054/final

Abstract: Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), passed by the White House in 2011 to encourage enhanced security, privacy, interoperability, and ease of use for online transactions. This document details summaries and outcomes of NSTIC pilots; in ad...

Publications ITL Bulletin (Final) October 29, 2014
https://csrc.nist.gov/pubs/itlb/2014/10/release-of-nist-sp-800147b-bios-protection-guideli/final

Abstract: Modern computers rely on fundamental system firmware, commonly known as the Basic Input/Output System (BIOS), to enable system components to communicate and work together. The BIOS is typically developed by both original equipment manufacturers (OEMs) and independent BIOS vendors. Manufacturers freq...

Publications SP 800-147B (Final) August 28, 2014
https://csrc.nist.gov/pubs/sp/800/147/b/final

Abstract: Modern computers rely on fundamental system firmware, commonly known as the Basic Input/Output System (BIOS), to facilitate the hardware initialization process and transition control to the hypervisor or operating system. Unauthorized modification of BIOS firmware by malicious software constitutes a...

Publications SP 800-83 Rev. 1 (Final) July 22, 2013
https://csrc.nist.gov/pubs/sp/800/83/r1/final

Abstract: Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating s...

Publications SP 800-40 Rev. 3 (Final) (Withdrawn) July 22, 2013

https://csrc.nist.gov/pubs/sp/800/40/r3/final

Abstract: Patch management is the process for identifying, acquiring, installing, and verifying patches for products and systems. This publication is designed to assist organizations in understanding the basics of enterprise patch management technologies. It explains the importance of patch management and exa...

Publications ITL Bulletin (Final) June 27, 2012
https://csrc.nist.gov/pubs/itlb/2012/06/cloud-computing-a-review-of-features-benefits-and/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different cloud computing technologies and configurations, an...

Publications IR 7848 (Initial Public Draft) May 7, 2012
https://csrc.nist.gov/pubs/ir/7848/ipd

Abstract: NISTIR 7848 defines the Asset Summary Reporting (ASR) format version 1.0, a data model for expressing the data exchange format of summary information relative to one or more metrics. ASR reduces the bandwidth requirement to report information about assets in the aggregate since it allows for reporti...

Publications Journal Article (Final) July 19, 2010
https://csrc.nist.gov/pubs/journal/2010/07/vulnerability-trends-measuring-progress/final

Journal: IT Professional Abstract: We analyzed data from the National Vulnerability Database (NVD). Designed and operated by the National Institute of Standards and Technology (NIST) with support from the Department of Homeland Security, the NVD provides fine-grained search capabilities of all publicly reported software vulnerabiliti...

Publications SP 800-81 Rev. 1 (Final) (Withdrawn) April 30, 2010

https://csrc.nist.gov/pubs/sp/800/81/r1/final

Abstract: This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corporate entity. The deployment guidelines follow from an analysis of security objectives and consequent protection approaches for all DNS components. This document was...

Publications SP 800-88 (Final) (Withdrawn) September 1, 2006

https://csrc.nist.gov/pubs/sp/800/88/upd1/final

Abstract: Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. These media may require special disposition in order to mitigate th...

Publications SP 800-88 (Final) (Withdrawn) August 31, 2006

https://csrc.nist.gov/pubs/sp/800/88/final

Abstract: Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. These media may require special disposition in order to mitigate th...

Publications ITL Bulletin (Final) July 1, 2003
https://csrc.nist.gov/pubs/itlb/2003/07/testing-intrusion-detection-systems/final

Abstract: In government and industry, intrusion detection systems (IDSs) are now standard equipment for large networks. IDSs are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. Despite the...

Publications IR 909 (Final) October 1, 1975
https://csrc.nist.gov/pubs/ir/909/final

Abstract: This index is a list of certain requirements which must be considered by Federal technical and administrative personnel in order to comply with those provisions of the Privacy Act of 1974* relating to automated systems design and development . This index has been derived from the Office of Managemen...

<< first   < previous   56     57     58     59     60     61     62     63     64     65     66     67     68     69     70     71     72     73     74     75     76     77     78     79     80  next >  last >>