Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1151 through 1175 of 15603 matching records.
Publications SP 1800-39 (Initial Preliminary Draft) April 25, 2023
https://csrc.nist.gov/pubs/sp/1800/39/iprd

Abstract:

Publications IR 8427 (Final) April 14, 2023
https://csrc.nist.gov/pubs/ir/8427/final

Abstract: The NIST Special Publication (SP) 800-90 series supports the generation of high-quality random bits for cryptographic and non-cryptographic use. The security strength of a random number generator depends on the unpredictability of its outputs. This unpredictability can be measured in terms of entrop...

Publications CSWP 28 (Final) April 6, 2023
https://csrc.nist.gov/pubs/cswp/28/security-segmentation-in-a-small-manufacturing-env/final

Abstract: Manufacturers are increasingly targeted in cyber-attacks.  Small manufacturers are particularly vulnerable due to limitations in staff and resources to operate facilities and manage cybersecurity. Security segmentation is a cost-effective and efficient security design approach for protecting cy...

Publications IR 8459 (Initial Public Draft) March 21, 2023
https://csrc.nist.gov/pubs/ir/8459/ipd

Abstract: This report focuses on the NIST-recommended block cipher modes of operation specified in NIST Special Publications (SP) 800-38A through 800-38F. The goal is to provide a concise survey of relevant research results about the algorithms and their implementations. Based on these findings, the report co...

Publications Journal Article (Final) March 16, 2023
https://csrc.nist.gov/pubs/journal/2023/03/users-are-not-stupid-six-cyber-security-pitfalls-o/final

Journal: Cyber Security: A Peer-Reviewed Journal Abstract: The skilled and dedicated professionals who strive to improve cyber security may unwittingly fall victim to misconceptions and pitfalls that hold other people back from reaching their full potential of being active partners in security. These pitfalls often reflect the cyber security community’s dep...

Publications Journal Article (Final) February 28, 2023
https://csrc.nist.gov/pubs/journal/2023/02/empirical-validation-of-automated-vulnerability-cu/final

Journal: IEEE Transactions on Software Engineering Abstract: Prior research has shown that public vulnerability systems such as US National Vulnerability Database (NVD) rely on a manual, time-consuming, and error-prone process which has led to inconsistencies and delays in releasing final vulnerability results. This work provides an approach to curate vulnera...

Publications IR 8320D (Initial Public Draft) February 23, 2023
https://csrc.nist.gov/pubs/ir/8320/d/ipd

Abstract: Organizations employ a growing volume of machine identities, often numbering in the thousands or millions per organization. Machine identities, such as secret cryptographic keys, can be used to identify which policies need to be enforced for each machine. Centralized management of machine identities...

Publications SP 800-201 (Initial Public Draft) February 8, 2023
https://csrc.nist.gov/pubs/sp/800/201/ipd

Abstract: This document summarizes research performed by the members of the NIST Cloud Computing Forensic Science Working Group and presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA, also referred to as FRA for the sake of brevity), whose goal is to provide support for a cloud system’s...

Publications FIPS 186-5 (Final) February 3, 2023
https://csrc.nist.gov/pubs/fips/186-5/final

Abstract: This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidenc...

Publications SP 800-186 (Final) February 3, 2023
https://csrc.nist.gov/pubs/sp/800/186/final

Abstract: This Recommendation specifies the set of elliptic curves recommended for U.S. Government use. In addition to the previously recommended Weierstrass curves defined over prime fields and binary fields, this Recommendation includes two newly specified Edwards curves, which provide increased performance...

Publications IR 8323 Rev. 1 (Final) January 31, 2023
https://csrc.nist.gov/pubs/ir/8323/r1/final

Abstract: The national and economic security of the United States (U.S.) is dependent upon the reliable functioning of the nation’s critical infrastructure. Positioning, Navigation, and Timing (PNT) services are widely deployed throughout this infrastructure. In a government-wide effort to mitigate the potent...

Publications Other (Final) January 30, 2023
https://csrc.nist.gov/pubs/other/2023/01/30/handout-users-are-not-stupid-six-cybersecurity-pit/final

Abstract: The cybersecurity community tends to focus and depend on technology to solve today's cybersecurity problems, often without taking into consideration the human element - the key individual and social factors impacting cybersecurity adoption. This handout provides an overview of six human-element misc...

Publications IR 8214C (Initial Public Draft) January 25, 2023
https://csrc.nist.gov/pubs/ir/8214/c/ipd

Abstract: This document calls for public submissions of multi-party threshold schemes, to support the National Institute of Standards and Technology (NIST) in developing future recommendations and guidelines. In a threshold scheme, an underlying key-based cryptographic primitive is executed while a private/se...

Publications Conference Paper (Final) January 17, 2023
https://csrc.nist.gov/pubs/conference/2023/01/17/an-investigation-of-roles-backgrounds-knowledge-an/final

Conference: ACM SIGMIS Computers and People Research Conference 2022 Abstract: Security awareness professionals are tasked with implementing security awareness programs within their organizations to assist employees in recognizing and responding to security issues. Prior industry-focused surveys and research studies identified desired skills for these professionals, finding th...

Publications SP 1288 (Final) January 11, 2023
https://csrc.nist.gov/pubs/sp/1288/final

Abstract: Most United States federal government organizations are required to conduct cybersecurity role-based training for federal government personnel and supporting contractors who are assigned roles having security and privacy responsibilities. Despite the training mandate, there has been little prior eff...

Publications SP 800-157 Rev. 1 (Initial Public Draft) January 10, 2023
https://csrc.nist.gov/pubs/sp/800/157/r1/ipd

Abstract: This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable credentials that are issued by federal departments and agencies to individuals who possess and prove control of their valid PIV Card. These credentials can be either public key infrastructur...

Publications SP 800-217 (Initial Public Draft) January 10, 2023
https://csrc.nist.gov/pubs/sp/800/217/ipd

Abstract: FIPS 201 defines the requirements and characteristics of government-wide interoperable identity credentials used by federal employees and contractors. It also calls for the federated use of those credentials. These guidelines provide technical requirements for federal agencies implementing digital i...

Publications IR 8401 (Final) December 30, 2022
https://csrc.nist.gov/pubs/ir/8401/final

Abstract: Space operations are increasingly important to the national and economic security of the United States. Commercial space’s contribution to the critical infrastructure is growing in both volume and diversity of services as illustrated by the increased use of commercial communications satellite (COMSA...

Publications Project Description (Final) December 22, 2022
https://csrc.nist.gov/pubs/pd/2022/12/22/responding-to-and-recovering-from-a-cyber-attack-m/final

Abstract: The Operational Technology (OT) that runs manufacturing environments play a critical role in the supply chain. Manufacturing organizations rely on OT to monitor and control physical processes that produce goods for public consumption. These same systems are facing an increasing number of cyber attac...

Publications SP 800-63B-4 (Initial Public Draft) December 16, 2022
https://csrc.nist.gov/pubs/sp/800/63/b/4/ipd

Abstract: These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of subjects interacting with government information...

Publications SP 800-63A-4 (Initial Public Draft) December 16, 2022
https://csrc.nist.gov/pubs/sp/800/63/a/4/ipd

Abstract: These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and verification of an identity for use in digital authe...

Publications SP 800-63-4 (Initial Public Draft) December 16, 2022
https://csrc.nist.gov/pubs/sp/800/63/4/ipd

Abstract: These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and authentication of users (such as employees, contractor...

Publications SP 800-63C-4 (Initial Public Draft) December 16, 2022
https://csrc.nist.gov/pubs/sp/800/63/c/4/ipd

Abstract: These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the use of federated identity and the use of assertions to implement id...

Publications SP 1800-34 (Final) December 9, 2022
https://csrc.nist.gov/pubs/sp/1800/34/final

Abstract: Organizations are increasingly at risk of cyber supply chain compromise, whether intentional or unintentional. Cyber supply chain risks include counterfeiting, unauthorized production, tampering, theft, and insertion of unexpected software and hardware. Managing these risks requires ensuring the int...

Publications Conference Paper (Final) November 18, 2022
https://csrc.nist.gov/pubs/conference/2022/11/18/the-generation-of-software-security-scoring-system/final

Conference: 2022 IEEE 29th Annual Software Technology Conference (STC) Abstract: While the existence of many security elements in software can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging to measure their relative security impact. In the physical world we can often measure the impact of individual elements to a system. However, i...

<< first   < previous   35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59  next >  last >>