Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2526 through 2550 of 15598 matching records.
Publications SP 800-52 (Final) (Withdrawn) June 9, 2005

https://csrc.nist.gov/pubs/sp/800/52/final

Abstract: These Guidelines briefly introduce computer communications architectural concepts. The Guidelines place the responsibility for communication security at the Transport layer of the OSI seven-layer communications stack, not within the application itself. Protection of sensitive but unclassified Govern...

Publications Conference Paper (Final) June 1, 2005
https://csrc.nist.gov/pubs/conference/2005/06/01/composing-and-combining-policies-under-the-policy/final

Conference: Tenth ACM Symposium on Access Control Models and Technologies (SACMAT '05) Abstract: As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods for configuring policy, and a tight coupling to a class of policies. To afford generalized protection, NIST has initiate...

Publications IR 7200 (Final) June 1, 2005
https://csrc.nist.gov/pubs/ir/7200/final

Abstract: The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices prov...

Publications ITL Bulletin (Final) June 1, 2005
https://csrc.nist.gov/pubs/itlb/2005/06/nists-security-configuration-checklists-program-fo/final

Abstract: This bulletin describes the NIST security configuration checklists program and is based on NIST Special Publication 800-70: Security Configuration Checklists Program for IT Products, by Murugiah Souppaya, John Wack and Karen Kent. The bulletin discusses checklists and their benefits, and explains ho...

Publications SP 800-38B (Final) (Withdrawn) May 1, 2005

https://csrc.nist.gov/pubs/sp/800/38/b/final

Abstract: This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary data.

Publications SP 800-70 (Final) (Withdrawn) May 1, 2005

https://csrc.nist.gov/pubs/sp/800/70/final

Abstract: The National Institute of Standards and Technology (NIST) has produced Security Configuration Checklists Program for IT Products: Guidance for Checklist Users and Developers to facilitate the development and dissemination of security configuration checklists so that organizations and individual user...

Publications ITL Bulletin (Final) May 1, 2005
https://csrc.nist.gov/pubs/itlb/2005/05/recommended-security-controls-for-federal-informat/final

Abstract: This ITL Bulletin summarizes NIST SP 800-53, Recommended Security Controls for Federal Information Systems and discusses the use of SP 800-53 within the context of federal agency information security programs. The bulletin covers SP 800-53 and Federal Information Security Management Act (FISMA) requ...

Publications SP 800-78 (Final) (Withdrawn) April 25, 2005

https://csrc.nist.gov/pubs/sp/800/78/final

Abstract: The Homeland Security Presidential Directive (HSPD) 12 mandated the creation of new standards for interoperable identity credentials for physical and logical access to Federal government locations and systems. Federal Information Processing Standard 201 (FIPS 201), Personal Identity Verification (PI...

Publications SP 800-53 (Final) (Withdrawn) April 22, 2005

https://csrc.nist.gov/pubs/sp/800/53/upd1/final

Abstract: The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government. The guidelines have been developed to help achieve more secure information systems within the federal governmen...

Publications SP 800-73 (Final) (Withdrawn) April 8, 2005

https://csrc.nist.gov/pubs/sp/800/73/final

Abstract: The Homeland Security Presidential Directive HSPD-12 called for a common identification standard to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Identity Verification (PIV) of Federal...

Publications ITL Bulletin (Final) April 1, 2005
https://csrc.nist.gov/pubs/itlb/2005/04/implementing-the-health-insurance-portability-and/final

Abstract: This ITL Bulletin helps to educate readers about the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out in the Security Rule. This publication is also designed to direct readers to helpful information in other NIST publications on individual topics the...

Publications SP 800-66 (Final) (Withdrawn) March 1, 2005

https://csrc.nist.gov/pubs/sp/800/66/final

Abstract: This Special Publication summarizes the HIPAA security standards and explains some of the structure and organization of the Security Rule. This publication helps to educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the sec...

Publications ITL Bulletin (Final) March 1, 2005
https://csrc.nist.gov/pubs/itlb/2005/03/personal-identity-verification-piv-of-federal-empl/final

Abstract: Federal Information Processing Standard (FIPS) 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, was approved by Carlos M. Guitierrez, the U.S. Secretary of Commerce, on February 25, 2005. The standard specifies a system based on the use of smart cards, which will be is...

Publications SP 800-53 (Final) (Withdrawn) February 28, 2005

https://csrc.nist.gov/pubs/sp/800/53/final

Abstract: The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government. The guidelines have been developed to help achieve more secure information systems within the federal governmen...

Publications FIPS 201 (Final) (Withdrawn) February 25, 2005

https://csrc.nist.gov/pubs/fips/201/final

Abstract: This standard specifies the architecture and technical requirements for a common identification standard for Federal employees and contractors. The overall goal is to achieve appropriate security assurance for multiple applications by efficiently verifying the claimed identity of individuals seeking...

Publications ITL Bulletin (Final) January 27, 2005
https://csrc.nist.gov/pubs/itlb/2005/01/integrating-information-technology-it-security-int/final

Abstract: This bulletin describes NIST's Special Publication (SP) 800-65, Integrating IT Security into the Capital Planning and Investment Control Process. It provides tips and pointers in addition to a sample methodology, which can be used to address prioritization of security requirements in support of agen...

Publications SP 800-65 (Final) (Withdrawn) January 1, 2005

https://csrc.nist.gov/pubs/sp/800/65/final

Abstract: Traditionally, information technology (IT) security and capital planning and investment control (CPIC) processes have been performed independently by security and capital planning practitioners. However, the Federal Information Security Management Act (FISMA) of 2002 and other existing federal regul...

Publications SP 800-58 (Final) January 1, 2005
https://csrc.nist.gov/pubs/sp/800/58/final

Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issues are associated with still-evolving VOIP technolo...

Publications IR 7188 (Final) January 1, 2005
https://csrc.nist.gov/pubs/ir/7188/final

Abstract: This document specifies the data model and XML representation for the Extensible Configuration Checklist Description Format. An XCCDF document is a structured collection of security configuration rules for some set of target systems. The XCCDF specification is designed to support information interch...

Publications SP 800-72 (Final) November 1, 2004
https://csrc.nist.gov/pubs/sp/800/72/final

Abstract: Forensic specialists periodically encounter unusual devices and new technologies normally not envisaged as having immediate relevance from a digital forensics perspective. The objective of the guide is twofold: to help organizations evolve appropriate policies and procedures for dealing with Persona...

Publications ITL Bulletin (Final) (Withdrawn) November 1, 2004

https://csrc.nist.gov/pubs/itlb/2004/11/understanding-the-new-nist-standards-and-guideline/final

Abstract: This bulletin summarizes an article entitled "Understanding the New FISMA-Required NIST Standards and Guidelines" by Ron S. Ross, PhD. It highlights FIPS 199, "Standards for Security Categorization of Federal Information and Information Systems," which is NIST's flagship standard in support of the F...

Publications ITL Bulletin (Final) October 1, 2004
https://csrc.nist.gov/pubs/itlb/2004/10/securing-voice-over-internet-protocol-ip-networks/final

Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibility are among the promises of VOIP for the enterpri...

Publications SP 800-63 (Final) (Withdrawn) September 27, 2004

https://csrc.nist.gov/pubs/sp/800/63/upd1/final

Abstract: This recommendation provides technical guidance to Federal agencies implementing electronic authentication. The recommendation covers remote authentication of users over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registrat...

Publications IR 7122 (Final) September 8, 2004
https://csrc.nist.gov/pubs/ir/7122/final

Abstract: NIST hosted the third annual Public Key Infrastructure (PKI) Research Workshop on April 12-14, 2004. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key authentication and authorization technolo...

Publications ITL Bulletin (Final) September 1, 2004
https://csrc.nist.gov/pubs/itlb/2004/09/information-security-within-the-system-development/final

Abstract: Many system development life cycle (SDLC) models exist that can be used by an organization to effectively develop an information system. Security should be incorporated into all phases, from initiation to disposition, of an SDLC model. This Bulletin lays out a general SDLC that includes five phases....

<< first   < previous   90     91     92     93     94     95     96     97     98     99     100     101     102     103     104     105     106     107     108     109     110     111     112     113     114  next >  last >>