Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2176 through 2200 of 4845 matching records.
Publications Journal Article (Final) September 1, 2019
https://csrc.nist.gov/pubs/journal/2019/09/optimizing-network-diversity/final

Journal: Computer Communications Abstract: Diversity as a security mechanism is receiving renewed interest due to its potential for improving the resilience of software and networks against previously unknown attacks. Recent works show diversity can be modeled and quantified as a security metric at the network level. However, such efforts do...

Publications SP 1800-17 (Final) July 30, 2019
https://csrc.nist.gov/pubs/sp/1800/17/final

Abstract: As retailers in the United States have adopted chip-and-signature and chip-and-PIN (personal identification number) point-of-sale (POS) security measures, there have been increases in fraudulent online card-not-present electronic commerce (e-commerce) transactions. The risk of increased fraudulent o...

Publications Conference Paper (Final) April 1, 2019
https://csrc.nist.gov/pubs/conference/2019/04/01/browser-fingerprinting-using-combinatorial-sequenc/final

Conference: Hot Topics in the Science of Security Abstract: In this paper, we report on the applicability of combinatorial sequence testing methods to the problem of fingerprinting browsers based on their behavior during a TLS handshake. We created an appropriate abstract model of the TLS handshake protocol and used it to map browser behavior to a feature ve...

Publications SP 800-131A Rev. 2 (Final) March 21, 2019
https://csrc.nist.gov/pubs/sp/800/131/a/r2/final

Abstract: The National Institute of Standards and Technology (NIST) provides cryptographic key management guidance for defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptogr...

Publications Journal Article (Final) December 21, 2018
https://csrc.nist.gov/pubs/journal/2018/12/threat-modeling-for-cloud-infrastructures/final

Journal: EAI Endorsed Transactions on Security and Safety Abstract: Today's businesses are increasingly relying on the cloud as an alternative IT solution due to its flexibility and lower cost. Compared to traditional enterprise networks, a cloud infrastructure is typically much larger and more complex. Understanding the potential security threats in such infrastruc...

Publications Journal Article (Final) November 1, 2018
https://csrc.nist.gov/pubs/journal/2018/11/access-control-for-emerging-distributed-systems/final

Journal: Computer (IEEE Computer) Abstract: As big data, cloud computing, grid computing, and the Internet of Things reshape current data systems and practices, IT experts are keen to harness the power of distributed systems to boost security and prevent fraud. How can these systems’ capabilities be used to improve processing without inflatin...

Publications Other (Initial Public Draft) October 17, 2018
https://csrc.nist.gov/pubs/other/2018/10/17/iot-trust-concerns/ipd

Abstract: The Internet of Things (IoT) refers to systems that involve computation, sensing, communication, and actuation (as presented in NIST Special Publication (SP) 800-183). IoT involves the connection between humans, non-human physical objects, and cyber objects, enabling monitoring, automation, and deci...

Publications Conference Paper (Final) July 10, 2018
https://csrc.nist.gov/pubs/conference/2018/07/10/insider-threat-of-remote-administrators-in-clouds/final

Conference: IFIP Annual Conference on Data and Applications Security and Privacy Abstract: As today’s cloud providers strive to attract customers with better services and less downtime in a highly competitive market, they increasingly rely on remote administrators including those from third party providers for fulfilling regular maintenance tasks. In such a scenario, the privileges grante...

Publications Conference Paper (Final) April 10, 2018
https://csrc.nist.gov/pubs/conference/2018/04/10/what-proportion-of-vulns-attributed-to-ordinary-co/final

Conference: Hot Topics in the Science of Security Abstract: The analysis reported in this poster developed from questions that arose in discussions of the Reducing Software Vulnerabilities working group, sponsored by the White House Office of Science and Technology Policy in 2016 [1]. The key question we sought to address is the degree to which vulnerabiliti...

Publications Journal Article (Final) March 23, 2018
https://csrc.nist.gov/pubs/journal/2018/03/surviving-unpatchable-vulns-multioption-network-ha/final

Journal: Journal of Computer Security Abstract: The administrators of a mission critical network usually have to worry about non-traditional threats, e.g., how to live with known, but unpatchable vulnerabilities, and how to improve the network’s resilience against potentially unknown vulnerabilities. To this end, network hardening is a well-known...

Publications Journal Article (Final) March 19, 2018
https://csrc.nist.gov/pubs/journal/2018/03/local-randomness-examples-and-application/final

Journal: Physical Review A Abstract: When two players achieve a superclassical score at a nonlocal game, their outputs must contain intrinsic randomness. This fact has many useful implications for quantum cryptography. Recently it has been observed [C. Miller and Y. Shi, Quantum Inf. Computat. 17, 0595 (2017)] that such scores also imp...

Publications Conference Paper (Final) February 18, 2018
https://csrc.nist.gov/pubs/conference/2018/02/18/user-context-an-explanatory-variable-in-phishing-s/final

Conference: Workshop on Usable Security (USEC) 2018 Abstract: Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training exercise data, focusing on the last three phishin...

Publications SP 800-126A (Final) February 14, 2018
https://csrc.nist.gov/pubs/sp/800/126/a/final

Abstract: The Security Content Automation Protocol (SCAP) is a multi-purpose framework of component specifications that support automated configuration, vulnerability, and patch checking, security measurement, and technical control compliance activities. The SCAP version 1.3 specification is defined by the co...

Publications Journal Article (Final) January 24, 2018
https://csrc.nist.gov/pubs/journal/2018/01/psst-can-you-keep-a-secret/final

Journal: Computer (IEEE Computer) Abstract: The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.

Publications Project Description (Final) January 23, 2018
https://csrc.nist.gov/pubs/pd/2018/01/23/securing-pacs-cybersecurity-for-healthcare/final

Abstract: Picture Archiving and Communication System (PACS) is defined by the Food and Drug Administration (FDA) as a Class II device that “provides one or more capabilities relating to the acceptance, transfer, display, storage, and digital processing of medical images. Its hardware components may include wo...

Publications ITL Bulletin (Final) November 27, 2017
https://csrc.nist.gov/pubs/itlb/2017/11/tdea-block-ciphers/final

Abstract: This bulletin summarizes the information found in NIST SP 800-67, Rev. 2, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. This bulletin offers an overview of the TDEA block cipher along with usage guidance and NIST's plans.

Publications IR 8194 (Final) October 10, 2017
https://csrc.nist.gov/pubs/ir/8194/final

Abstract: Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous and rapidly-increasing amount of damage to information systems and users annually. This project implements an exploratory computational model...

Publications Journal Article (Final) September 22, 2017
https://csrc.nist.gov/pubs/journal/2017/09/alexa-can-i-trust-you/final

Journal: Computer (IEEE Computer) Abstract: Several recent incidents highlight significant security and privacy risks associated with intelligent virtual assistants (IVAs). Better diagnostic testing of IVA ecosystems can reveal such vulnerabilities and lead to more trustworthy systems.

Publications Journal Article (Final) September 1, 2017
https://csrc.nist.gov/pubs/journal/2017/09/advancing-coordinated-cyberinvestigations/final

Journal: Digital Investigation Abstract: Any investigation can have a digital dimension, often involving information from multiple data sources, organizations and jurisdictions. Existing approaches to representing and exchanging cyber-investigation information are inadequate, particularly when combining data sources from numerous organizat...

Publications Conference Paper (Final) June 22, 2017
https://csrc.nist.gov/pubs/conference/2017/06/22/securing-networks-against-unpatchable-and-unknown/final

Conference: IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC 2017) Abstract: The administrators of a mission critical network usually have to worry about non-traditional threats, e.g., how to live with known, but unpatchable vulnerabilities, and how to improve the network’s resilience against potentially unknown vulnerabilities. To this end, network hardening is a well-knowf...

Publications Journal Article (Final) April 13, 2017
https://csrc.nist.gov/pubs/journal/2017/04/linear-time-algorithms-restrict-insider-access/final

Journal: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Abstract: An important way to limit malicious insiders from distributing sensitive information is to restrict access as tightly as possible. This has always been the goal in the design of access control mechanisms, but individual approaches can be inadequate. Approaches that instantiate multiple methods simul...

Publications Project Description (Final) March 9, 2017
https://csrc.nist.gov/pubs/pd/2017/03/09/securing-manufacturing-ics/final

Abstract: Industrial Control Systems (ICS) monitor and control physical processes in many different industries and sectors. Cyber attacks against ICS devices present a real threat to organizations that employ ICS to monitor and control manufacturing processes. The NIST Engineering Laboratory (EL), in conjunct...

Publications IR 8136 (Final) January 27, 2017
https://csrc.nist.gov/pubs/ir/8136/final

Abstract: The Middle Class Tax Relief Act of 2012 mandated the creation of the Nation’s first nationwide, high-speed communications network dedicated for public safety. The law instantiated a new federal entity, the Federal Responder Network Authority (FirstNet), to build, maintain, and operate a new Long Ter...

Publications Conference Paper (Final) January 26, 2017
https://csrc.nist.gov/pubs/conference/2017/01/26/measuring-improving-effectiveness-of-defenseindept/final

Conference: 2nd Annual Industrial Control System Security Workshop (ICSS '16), 2016 Annual Computer Security Applications Conference Abstract: Defense-in-depth is an important security architecture principle that has significant application to industrial control systems (ICS), cloud services, storehouses of sensitive data, and many other areas. We claim that an ideal defense-in-depth posture is 'deep', containing many layers of security, a...

Publications Conference Paper (Final) January 10, 2017
https://csrc.nist.gov/pubs/conference/2017/01/10/full-disk-encryption-bridging-theory-and-practice/final

Conference: RSA Conference 2017 Abstract: We revisit the problem of Full Disk Encryption (FDE), which refers to the encryption of each sector of a disk volume. In the context of FDE, it is assumed that there is no space to store additional data, such as an IV (Initialization Vector) or a MAC (Message Authentication Code) value. We formally...

<< first   < previous   76     77     78     79     80     81     82     83     84     85     86     87     88     89     90     91     92     93     94     95     96     97     98     99     100  next >  last >>