Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Projects

Showing 31 through 40 of 67 matching records.
Hash Functions
Approved AlgorithmsApproved hash algorithms for generating a condensed representation of a message (message digest) are specified in two Federal Information Processing Standards: FIPS 180-4, Secure Hash Standard and FIPS 202, SHA-3 Standard: Permutation...
High-Performance Computing Security HPCS
High-Performance Computing Security Overview:In July of 2015, the President of the United States issued Executive Order 13702 to create a National Strategic Computing Initiative (NSCI). The goal of the NSCI is to maximize the benefits of High...
Information Security and Privacy Advisory Board ISPAB
In January 1988, the Congress enacted the Computer Security Act of 1987 (Public Law 100-235). A provision of that law called for the establishment of the Computer System Security and Privacy Advisory Board (CSSPAB) within the Department of Commerce. In...
Information Security in the Systems Development Life Cycle SDLC
Information on Security in the Systems Development Life Cycle can be found in NIST Special Publication (SP) 800-64 Revision 2, Security Considerations in the System Development Life Cycle.An overview of SP 800-64 Rev. 2 is available in the...
Key Management
Publications that discuss the generation, establishment, storage, use and destruction of the keys used NIST’s cryptographic algorithmsProject Areas:Key Management GuidelinesKey EstablishmentCryptographic Key Management SystemsGenerally-speaking...
Lightweight Cryptography
NIST has initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms that are suitable for use in constrained environments where the performance of current NIST cryptographic standards is not acceptable.The Draft...
Low Power Wide Area IoT
Developing an IoT Laboratory based on LPWAN using LoRaWANThis project is developing a LoRaWAN infrastructure in order to study the security of communications based on Low Power Wide Area Networks, with the objective of Identifying and evaluating...
Measuring Security Risk in Enterprise Networks
Enterprise networks have become essential to the operation of companies, laboratories, universities, and government agencies. As they continue to grow both in size and complexity, their security has become a critical concern. Vulnerabilities are...
Message Authentication Codes MAC
The message authentication code (MAC) is generated from an associated message as a method for assuring the integrity of the message and the authenticity of the source of the message.  A secret key to the generation algorithm must be established...
Mobile Security and Forensics
Mobile ForensicsMobile devices, such as Personal Digital Assistants (PDAs), Blackberry, and cell phones have become essential tools in our personal and professional lives. The capabilities of these devices are continually evolving, providing users with...

<< first   < previous   1     2     3     4     5     6     7  next >  last >>