go to NIST home page go to CSRC home page go to Focus Areas page go to Publications page go to Advisories page go to Events page go to Site Map page go to ITL home page CSRC home page link
header image with links

 CSRC Homepage
 
 CSRC Site Map

   Search CSRC:

 CSD Publications:
   - Draft Publications
   - Special Publications
   - FIPS Pubs
   - ITL Security Bulletins
   - NIST IRs

 CSD Focus Areas:
   - Cryptographic Standards
       & Application
   - Security Testing
   - Security Research /
       Emerging Technologies
   - Security Management
       & Assistance

 General Information:
   - Site Map
   - List of Acronyms
   - Archived Projects
        & Conferences
   - Virus Information
   - National Vulnerability
        Database

 News & Events  
   - Federal News
   - Security Events


 Services For the: 
   - Federal Community
   - Vendor
   - User
   - Small/Medium
     Businesses


 Links & Organizations
   - Academic
   - Government
   - Professional
   - Additional Links

 NIST's National
 Vulnerability Database:
Search for Vulnerabilities
Enter vendor, software, or keyword

2001 News Archive Image

     Archives:
1998 | 1999 | 2000 |
2001 | 2002 |
2003 | 2004
| 2005 | 2006 | 2007 |

2001 News and Announcements

December:

  • December 14 -- NIST has recently developed the draft NIST Special Publication Security for Telecommuting and Broadband Communications. (NOTE: This Special Publication is now a FINAL Special Publication 800-46 and can be found on CSRC's Special Publications page.) This document is intended to assist those responsible users, system administrators, and management for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. We would greatly appreciate receiving any comments you may have! Please provide them directly to Rick Kuhn by January 18, 2002.
  • December 14 -- The draft Guide for Interconnecting Information Systems (NOTE: This draft is now a FINAL Special Publication 800-47 and is available to view/download from the CSRC's Special Publications page) is available for public comment. The document provides guidance for planning, establishing, maintaining, and terminating interconnections between information systems that are owned and operated by different organizations. We seek your comments and suggestions. We especially seek your comments on the steps for planning and establishing an interconnection, based on readers' experiences. Furthermore, we are interested in receiving comments on the memorandum of understanding/agreement development guide contained in the document. Please address your comments to Timothy Grance and Joan Hash by January 18, 2002.
  • December 10 -- In SP 800-38A 2001 ED, Recommendation for Block Cipher Modes of Operation, five modes of operation are specified for use with any FIPS-approved block cipher algorithm, such as the Advanced Encryption Standard (AES) algorithm. Each of the five modes can provide confidentiality for electronic data. Further information on this special publication and the development of modes of operation is available at the modes home page.
  • December 4 -- FIPS 197, Advanced Encryption Standard (AES) (.pdf) became a Federal standard on November 26, 2001 and was announced in a Federal Register Notice (.pdf) and in a press release today. AES was developed to replace the Data Encryption Standard (DES) in a multi-year effort that began in 1997. The AES specifies a cryptographic algorithm that can be used to protect electronic data by encrypting (enciphering) and decrypting (deciphering) information. Details of the development process are available on the AES home page.

November:

  • November 5 -- NIST has worked with SANS to provide an enhanced top 20 vulnerability list (http://www.sans.org/top20.htm). The original list produced by SANS/FBI contained 20 important vulnerability areas with reference to over 140 specific vulnerabilities. The specific vulnerability references were not hyperlinked to associated vulnerability information. We remedied this deficiency by providing a version that links each of the 140 specific vulnerabilities to the associated vulnerability entry in the NIST ICAT Metabase (http://icat.nist.gov).

October:

  • October 9 -- A change notice for FIPS 186-2, Digital Signature Standard (DSS) (.pdf file), has been made available that addresses key sizes and random number generation. This change notice replaces the item that was posted on August 3, 2001, Recommendations Regarding Federal Information Processing Standard (FIPS) 186-2, Digital Signature Standard (DSS).
  • October 8 -- The Second Modes of Operation Workshop was held on August 24, 2001, in Goleta, CA; links to the workshop presentations and to a summary report are available here.
  • October 3 -- A draft of the Guide to Firewall Selection and Policy Recommendations (NOTE: This draft is NOW a FINAL Special Publication 800-41 document and can be viewed/downloaded from the CSRC's Special Publications page) is now available for public comment. This document is intended for technical managers in the firewall and network security areas, but it would also prove useful to those wishing to know more about firewall technology and recommended policies. We are particularly interested in any comments regarding the policy section of the document and the appendix of policy recommendations, e.g., is it understandable, are the policies realistic, should they be modified? Comments and questions are requested by November 10, 2001 and may be addressed to john.wack@nist.gov.
  • October 2 -- NIST has completed the FY01 Critical Infrastructure Grants Program competition. We selected 9 proposals from the 133 submitted and awarded $5M. Additional details can be found on the Grants page.
  • October 2 -- NIST is pleased to announce the Vulnerability and Threat Portal. This resource provides links to government vulnerability and threat resources in addition to security news, most popular vulnerabilities, and vulnerability statistics.

September:

August:

July:

  • July 26 -- The US National Security Agency (NSA) with the cooperation of the other government agencies and industry partners just released several guides to assist the Windows 2000 user community secure Windows 2000.
  • July 26 -- NIST's Information Technology Laboratory and Advanced Technology Program, the National Security Agency, the DoD Biometric Management Office, and the General Services Administration's Federal Technology Service, Center for Smart Card Solutions are proud to announce and sponsor the 2001 Biometric Consortium Conference. The conference will be held September 12-14, 2001 in Orlando. (was cancelled)
  • July 11 -- Announcing proposed changes to FIPS 186-2, Digital Signature Standard (DSS) and request for Comments. NIST is proposing that the Implementation Schedule of FIPS 186-2 be modified to extend the transition period for the acquisition of equipment implementing FIPS 186-2 from July 2001 to December 2002. This will enable agencies to continue to acquire commercial products based on PKCS #1. NIST also proposes that the Applications section of FIPS 186-2 be modified to clarify that implementations of PKCS #1 (version 1.5 or higher) may be used during the transition period. Comments may be sent to FIPS186@nist.gov. The notice appeared in the July 11, 2001, FEDERAL REGISTER, Volume 66, Number 133, page 36254.
  • July 11 -- Call for Nominations of Members on the Computer System Security and Privacy Advisory Board. NIST invites and requests nominations of individuals for appointment to the Computer System Security and Privacy Advisory Board, which are due by August 15, 2001. More information, including membership duties, is available here.
  • July 3 -- OMB Memorandum M-01-24 dated June 22, 2001 and entitled "Reporting Instructions for the Government Information Security Reform Act." These instructions will assist agencies in reporting the results of their annual system and program reviews by agency CIOs and program officials and independent evaluations by the agency Inspectors General.

June:

  • June 21 -- Ever wonder about the risks and threats to the nation's systems, networks and critical infrastructures? The CIA's National Intelligence Officer for Science and Technology recently testified before Congress on such risks from hackers, national governments, hactivists, industrial spies, organized crime, terrorists, etc. Read the testimony here.
  • June 4 -- NIST is developing Special Publication 800-30, Risk Management Guide (link will take you to Draft publications page) to provide a common, thorough foundation for use in the development of detailed risk management guidance and procedures. Public review is considered an important part of the NIST recommendation process.

    Any comments you have, along with suggestions for improvement, can be sent to gary.stoneburner@nist.gov by August 15, 2001.
  • June 1 -- NIST recently announced the Draft Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard (SHS), for public review and comment. The comment period expires on August 28, 2001.

May:

  • May 21 -- The American National Standards Institute’s (ANSI) Information Systems Standards Board (ISSB), the National Committee for Information Technology Standards (NCITS), the Data Interchange Standards Association (DISA), the Center for Global Standards Analysis (CGSA), the Cyberspace Policy Institute (CPI) and Info-Structure Security Dialogue (ISSD) are proud to announce the First Standards Coordination Conference.

    This one-day (July 17th, 2001, 9:00 a.m.-5:00 p.m.) conference to be held at the National Institute of Standards & Technology in Gaithersburg, MD will focus on one of the hottest subjects in information standards today -- Computer Security and Personal Authentication Standards. Topics to be covered include encryption and digital signature, personal authentication, and Internet security. A preliminary agenda is available and registration information is available here.
  • May 16 -- There has been a revision made to NIST Special Publication 800-22: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, (originally published: October 2000)
     
    This document was revised on: 5-15-2001 There is an Errata sheet for originally published version. To view the revised SP 800-22 and Errata sheet document
  • May 9 -- Computer Security Expert Assist Team (CSEAT). (UPDATED: Feb. 2004 -- The CSEAT program changed its name to PRISMA (Program Review for Information Security Management). The CSEAT is a team of computer security experts located in the Computer Security Division of the Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST). The CSEAT helps Federal agencies protect their information systems in accordance with directives on critical infrastructure protection and applicable statutes. These directives identify the Federal government as one of the critical infrastructures requiring protection to ensure continued functioning of government, society, and the economy in the face of natural, inadvertent, or purposeful disruptions.

April:

  • April 25 -- The comment period for the draft FIPS for a Keyed-Hash Message Authentication Code (HMAC) closed on April 5th.
  • April 13 -- Critical Infrastructure Protection Grants Program. NIST invites proposals from eligible organizations for funding projects under the Critical Infrastructure Protection Grants Program (CIPGP). In order to provide satisfactory infrastructure security, additional research must be conducted on unique infrastructure security problems. The United States Government has sponsored considerable research in the area of computer security for military and intelligence systems. Some of this research applies to the critical infrastructure problem, but much remains to be done. The new grants program, administered by NIST, will target infrastructure IT security issues applicable to civilian and commercial systems.

March:

  • March 22 -- Nine newly designated Centers for Academic Excellence in Information Assurance Education were announced by the National Security Agency. They join the list of fourteen other universities across the United States who have been awarded this distinction. All of these universities passed vigorous examinations for quality in information assurance education.
  • March 21 -- NIST has completed two draft guidance documents that are available for review:
     
    A) The first, on public key technology (PKI) and the Federal PKI, was developed to assist decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively. The document provides a brief overview of issues related to the emerging Federal PKI, and its implementation within government agencies. It also reviews the risks and benefits of various PKI components, and some of the tradeoffs that are possible in the implementation and operation of PKIs within the Federal government (NOTE: This draft has been FINALIZED by Special Publications 800-32, that can be viewed/downloaded on the CSRC's Special Publications page).
    Any questions e-mail Rick: kuhn@nist.gov.

    B) The second, on guidance on active content and mobile code, addresses the security risks and informed IT security decision making on the application of active content technologies. The document provides background information on markup languages and other World Wide Web technologies involving active content, discusses generic threats, reviews risks drawn from past exploits involving technology-related vulnerabilities, and identifies available countermeasures. Both high-level and detailed recommendations are provided as well (NOTE: This draft document has been FINALIZED as a Special Publication 800-28 which can be viewed/downloaded from CSRC's Special Publications page). Any questions e-mail Wayne Jansen: wjansen@nist.gov.

  • March 8 -- We are pleased to announce that the NIST draft Special Publication, "Self-Assessment Guide for Information Technology Systems" is now available for review. (NOTE: This draft document has been FINALIZED as Special Publication 800-26 and can be viewed/downloaded from CSRC's Special Publications page) This self-assessment guide utilizes an extensive questionnaire containing specific control objectives against which a system or group of interconnected systems can be tested and measured.
    Any questions e-mail: marianne.swanson@nist.gov.
  • March 8 -- The National Infrastructure Protection Center has issued an advisory on "E-Commerce Vulnerabilities." The FBI has continued to observe hacker activity targeting victims associated with e-commerce or e-finance/banking businesses. In many cases, the hacker activity had been ongoing for several months before the victim became aware of the intrusion. The NIPC emphasizes the recommendation that all computer network systems administrators check relevant systems and consider applying the updated patches as necessary, especially for systems related to e-commerce or e-banking/financial businesses. Click here for further info and patch information. A list of all NIPC warnings is located here.

February:

  • February 28 -- NIST has announced that it is soliciting public comments on the Draft FIPS for the AES. (NOTE: The draft FIPS for AES has been FINALIZED as a FIPS Publication 197, and can be viewed/downloaded from CSRC's FIPS publications page) The 90-day comment period will close on May 29, 2001. Copies of the Draft FIPS and other information related to the AES are available at the AES home page.
  • February 28 -- (Position offer now CLOSED) NIST's Computer Security Division is soliciting applications for two Group Manager positions to supervise the Security Management and Assistance Group and the Security Testing and Metrics Group. See NIST/01-1271B/C, NIST/01-1271A/C, and NIST/01-1270/CA for details. If you want to help lead NIST's security efforts, please apply!
  • February 12 -- NIST has recently completed a draft guidance document on Intrusion Detection systems, (now a Special Publication document). This guidance document is intended to assist Federal agencies and others as a primer in intrusion detection, developed for those who need to understand what security goals intrusion detection mechanisms serve, how to select and configure intrusion detection systems for their specific system and network environments, how to manage the output of intrusion detection systems, and how to integrate intrusion detection functions with the rest of the organizational security infrastructure. E-mail Peter Mell for questions.
  • February 7 -- (Position offer now CLOSED) NIST's Computer Security Division has vacancies available to assist in the development of security guidelines and also to staff the new NIST's Computer Security Expert Assist Team (CSEAT). NIST/01-1104/CA, NIST/01/1066A/C, and NIST/01-1066B/C. If you are a security expert looking to make a difference in protecting Federal systems, please consider applying!
  • February 7 -- NIST's Computer Security Division has vacancies available to assist in the development of security guidelines and also to staff the new NIST's Computer Security Expert Assist Team (CSEAT). See NIST vacancies announcements NIST/01-1104/CA, NIST/01/1066A/C, and NIST/01-1066B/C. If you are a security expert looking to make a difference in protecting Federal systems, please consider applying!

January:

  • January 31 -- The General Accounting Office issued a report to Congress dated January 2001 addressing major management challenges and program risks. This 2001 Performance and Accountability Series and High Risk Series contains a government-wide perspective report as well as separate reports on 21 agencies covering each cabinet department, independent agencies and the U.S. Postal Service.
  • January 29 -- The National Institute of Standards and Technology (NIST) and the National Security Agency (NSA), partners in the National Information Assurance Partnership (NIAP), invite interested parties to attend a Government-Industry IT Security Forum on March 7, 2001 (Indianapolis, IN) to discuss potential public and private sector strategies for the development of security requirements and specifications needed for the protection of government, business and personal computing and real-time control systems. This Forum will help bring national attention to the concept of security requirements definition and its importance in developing a more secure information infrastructure within the United States. More info.
  • January 16 -- OMB Director, Jacob Lew issued a memorandum that provided guidance on implementing the Government Information Security Reform Act (in .pdf format). The guidance focuses on unclassified Federal systems and addresses only those areas of the legislation that introduce new or modified requirements. It also refers to some of the Act's provisions for national security systems.
  • January 5 -- NIST has published for comment a draft Federal Information Processing Standard for the Keyed-Hash Message Authentication Code (HMAC). The draft specifies an algorithm for applications requiring message authentication, which is achieved through construction of a message authentication code based upon a crypto hash function. It allows for authentication of both the source of a message and its integrity. Click here for details.
  • January 3 -- The U.S. Department of the Treasury has published policies and practices for the use of electronic transactions and authentication techniques in Federal payments and collections. Click here for details.


 

Last updated: March 7, 2007
Page created: January 5, 2001