Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1826 through 1850 of 4845 matching records.
Publications Conference Paper (Final) August 2, 2015
https://csrc.nist.gov/pubs/conference/2015/08/02/password-policy-languages-usable-translation-infor/final

Conference: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust Abstract: Password policies – documents which regulate how users must create, manage, and change their passwords – can have complex and unforeseen consequences on organizational security. Since these policies regulate user behavior, users must be clear as to what is expected of them. Unfortunately, current po...

Publications IR 8023 (Final) February 23, 2015
https://csrc.nist.gov/pubs/ir/8023/final

Abstract: This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices (RDs). It suggests appropriate countermeasures in the context of the System Development Life Cycle. A security risk assessment tem...

Publications SP 800-57 Part 3 Rev. 1 (Final) January 22, 2015
https://csrc.nist.gov/pubs/sp/800/57/pt3/r1/final

Abstract: NIST Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. governme...

Publications IR 7628 Rev. 1 (Final) September 25, 2014
https://csrc.nist.gov/pubs/ir/7628/r1/final

Abstract: This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related characteristics, risks, and vulnerabilities. Organizations in t...

Publications ITL Bulletin (Final) July 10, 2014
https://csrc.nist.gov/pubs/itlb/2014/07/release-of-nist-interagency-report-7946-cvss-imple/final

Abstract: The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey severity and risk of information system vulnerabilities. CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) in support of the global Vulnerability Disclosure Framework. It is currently mai...

Publications Conference Paper (Final) June 22, 2014
https://csrc.nist.gov/pubs/conference/2014/06/22/cognitivebehavioral-framework-user-password-mgmt-l/final

Conference: Second International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) Abstract: Passwords are the most commonly used mechanism in controlling users’ access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password, using the password to authenticate, then to the...

Publications Conference Paper (Final) June 22, 2014
https://csrc.nist.gov/pubs/conference/2014/06/22/character-strings-memory-and-passwords/final

Conference: Second International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) Abstract: Many users must authenticate to multiple systems and applications, often using different passwords, on a daily basis. At the same time, the recommendations of security experts are driving increases in the required character length and complexity of passwords. The thinking is that longer passwords wi...

Publications Conference Paper (Final) June 22, 2014
https://csrc.nist.gov/pubs/conference/2014/06/22/i-cant-type-that-password-entry-on-mobile-devices/final

Conference: Second International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2014) Abstract: Given the numerous constraints of onscreen keyboards, such as smaller keys and lack of tactile feedback, remembering and typing long, complex passwords—an already burdensome task on desktop computing systems—becomes nearly unbearable on small mobile touchscreens. Complex passwords require numerous s...

Publications Journal Article (Final) June 2, 2014
https://csrc.nist.gov/pubs/journal/2014/06/nist-cybersecurity-framework-addresses-risks-to-cr/final

Journal: ei Magazine Abstract: On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive Order directing the Administration to take steps...

Publications ITL Bulletin (Final) February 19, 2014
https://csrc.nist.gov/pubs/itlb/2014/02/framework-for-improving-critical-infrastructure-cy/final

Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed NIST to work with stakeholders to develop a...

Publications SP 800-81-2 (Final) September 18, 2013
https://csrc.nist.gov/pubs/sp/800/81/2/final

Abstract: The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up of computing and communication entities called Name...

Publications Journal Article (Final) January 1, 2013
https://csrc.nist.gov/pubs/journal/2013/01/advances-in-biometric-standardisation/final

Journal: International Journal of Biometrics Abstract: The paper discusses the current status of biometric standards development activities, with a focus on international standards developments. Published standards, as well as standards under development or planned for the near future, are addressed. The work of Joint Technical Committee 1 of ISO and IE...

Publications SP 800-30 Rev. 1 (Final) September 17, 2012
https://csrc.nist.gov/pubs/sp/800/30/r1/final

Abstract: The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations, amplifying the guidance in Special Publication 800-39. Risk assessments, carried out at all three tiers in the risk management hierarchy, are part of an...

Publications IR 7275 Rev. 4 (Final) March 1, 2012
https://csrc.nist.gov/pubs/ir/7275/r4/upd1/final

Abstract: This report specifies the data model and Extensible Markup Language (XML) representation for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2. An XCCDF document is a structured collection of security configuration rules for some set of target systems. The XCCDF specifica...

Publications Other (Final) December 1, 2011
https://csrc.nist.gov/pubs/other/2011/12/01/ict-scrm-community-framework-development-project-f/final

Abstract: Under Initiative 11 of the President’s CNCI Program, the National Institute of Standards and Technology (NIST) has been tasked with supporting federal policy development in Supply Chain Risk Management (SCRM) for Information Communications Technology (ICT). To support NIST’s work, the Supply Chain...

Publications IR 7275 Rev. 4 (Final) (Withdrawn) September 30, 2011

https://csrc.nist.gov/pubs/ir/7275/r4/final

Abstract: This report specifies the data model and Extensible Markup Language (XML) representation for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2. An XCCDF document is a structured collection of security configuration rules for some set of target systems. The XCCDF specifica...

Publications SP 800-147 (Final) April 29, 2011
https://csrc.nist.gov/pubs/sp/800/147/final

Abstract: This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS’s unique and privileged position wit...

Publications Journal Article (Final) April 1, 2011
https://csrc.nist.gov/pubs/journal/2011/04/the-policy-machine-a-novel-architecture-and-framew/final

Journal: Journal of Systems Architecture Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practi...

Publications Book Section (Final) October 22, 2010
https://csrc.nist.gov/pubs/book-section/2010/10/intrusion-detection-and-prevention-systems/final

In: Handbook of Information and Communication Security Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. An i...

Publications SP 800-127 (Final) (Withdrawn) September 30, 2010

https://csrc.nist.gov/pubs/sp/800/127/final

Abstract: The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and to provide recommendations on using these capabilities. WiMAX technology is a wireless metropolitan area network (WMAN) technology based upo...

Publications Conference Paper (Final) August 23, 2010
https://csrc.nist.gov/pubs/conference/2010/08/23/specification-of-attribute-relations-for-access-co/final

Conference: Sixth International Conference on Information Assurance and Security (IAS 2010) Abstract: Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today s de-facto access control protocol and specification language, XACML, does not provide sufficien...

Publications Journal Article (Final) June 1, 2010
https://csrc.nist.gov/pubs/journal/2010/06/adding-attributes-to-rolebased-access-control/final

Journal: Computer (IEEE Computer) Abstract: Role based access control (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must determine their risk exposure from employee IT system access...

Publications SP 800-70 Rev. 1 (Final) (Withdrawn) September 30, 2009

https://csrc.nist.gov/pubs/sp/800/70/r1/final

Abstract: A security configuration checklist is a series of instructions for configuring a product to a particular operational environment. Checklists can comprise templates or automated scripts, patches or patch descriptions, XML files, and other procedures. Checklists are intended to be tailored by each org...

Publications SP 800-113 (Final) July 1, 2008
https://csrc.nist.gov/pubs/sp/800/113/final

Abstract: Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or more VPN devices to which users connect using their Web browsers. The traffic between the Web browser and SSL VPN device is encrypted with...

Publications SP 800-79-1 (Final) (Withdrawn) June 18, 2008

https://csrc.nist.gov/pubs/sp/800/79/1/final

Abstract: The purpose of this publication is to provide appropriate and useful guidelines for accrediting the reliability of issuers of Personal Identity Verification cards that are established to collect, store, and disseminate personal identity credentials and issue smart cards, based on the standards publi...

<< first   < previous   62     63     64     65     66     67     68     69     70     71     72     73     74     75     76     77     78     79     80     81     82     83     84     85     86  next >  last >>