U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1101 through 1125 of 13602 matching records.
Publications SP 800-53 Rev. 5 December 10, 2020
https://csrc.nist.rip/publications/detail/sp/800-53/rev-5/final

Abstract: This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural d...

Publications SP 1800-25 December 8, 2020
https://csrc.nist.rip/publications/detail/sp/1800-25/final

Abstract: Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations’ data, such as database records, system files, configurations, user files, applications, and customer data, are all potential targets of data corruption, modificati...

Publications SP 1800-26 December 8, 2020
https://csrc.nist.rip/publications/detail/sp/1800-26/final

Abstract: Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and customer data are all potential targets of data cor...

Publications Conference Proceedings December 7, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/12/07/measurements-of-most-significant-software-security-weaknesses

Conference: Annual Computer Security Applications Conference (ACSAC) 2020 Abstract: In this work, we provide a metric to calculate the most significant software security weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of related vulnerabilities. The Common Weakness Enumeration (CWE) is a well known and used list of software security weaknes...

Publications Conference Proceedings December 7, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/12/07/improvements-of-algebraic-attacks-for-solving-minrank

Conference: 26th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2020) Abstract: In this paper, we show how to significantly improve algebraic techniques for solving the MinRank problem, which is ubiquitous in multivariate and rank metric code based cryptography. In the case of the structured MinRank instances arising in the latter, we build upon a recent breakthrough [11] showi...

Publications Journal Article December 1, 2020
https://csrc.nist.rip/publications/detail/journal-article/2020/an-approach-for-detection-of-advanced-persistent-threat-attacks

Journal: Computer (IEEE Computer) Abstract: Advanced Persistent Threat (APT) campaigns employ sophisticated strategies and tactics to achieve their attack goal. The evolution of APT strategies and tactics compounds the challenge of detecting attack campaigns. This article introduces an approach whose purpose is to assist cybersecurity analyst...

Publications NISTIR 8278A November 20, 2020
https://csrc.nist.rip/publications/detail/nistir/8278a/final

Abstract: The National Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships between elements of their documents and elements of other documents like the NIST Cybersecurity Fram...

Publications NISTIR 8278 November 20, 2020
https://csrc.nist.rip/publications/detail/nistir/8278/final

Abstract: The National Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts in defining standardized Online Informative References (OLIRs), which are relationships between elements of their documents and elements of other documents like the NIST Cybersecurity Fram...

Publications SP 800-181 Rev. 1 November 16, 2020
https://csrc.nist.rip/publications/detail/sp/800-181/rev-1/final

Abstract: This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Know...

Publications White Paper November 16, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/11/16/observations-on-comet/final

Abstract: This note provides two observations on COMET, a second round candidate of the NIST lightweight cryptography standardization process. The first observation uses a long message to detect the use of weak keys, whereas the second observation focuses on the resistance of COMET against slide attacks. Thes...

Publications SP 800-208 October 29, 2020
https://csrc.nist.rip/publications/detail/sp/800-208/final

Abstract: This recommendation specifies two algorithms that can be used to generate a digital signature, both of which are stateful hash-based signature schemes: the Leighton-Micali Signature (LMS) system and the eXtended Merkle Signature Scheme (XMSS), along with their multi-tree variants, the Hierarchical S...

Publications SP 800-209 October 26, 2020
https://csrc.nist.rip/publications/detail/sp/800-209/final

Abstract: Storage technology, just like its computing and networking counterparts, has evolved from traditional storage service types, such as block, file, and object. Specifically, the evolution has taken two directions: one along the path of increasing storage media capacity (e.g., tape, Hard Disk Drives, s...

Publications Conference Proceedings October 24, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/10/24/combinatorial-methods-for-explainable-ai

Conference: IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW 2020) Abstract: This short paper introduces an approach to producing explanations or justifications of decisions made by artificial intelligence and machine learning (AI/ML) systems, using methods derived from fault location in combinatorial testing. We use a conceptually simple scheme to make it easy to justify cl...

Publications White Paper NIST Technical Note (TN) 2111 October 22, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/10/22/an-empirical-study-on-flow-based-botnet-attacks-prediction/final

Abstract: In the era of the Internet of Things, botnet threats are rising, which has prompted many studies on botnet detection and measurement. In contrast, this study aims to predict botnet attacks, such as massive spam emails and distributed denial-of-service attacks. To that end, this empirical study prese...

Publications White Paper October 21, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/10/21/implementing-a-zero-trust-architecture/final

Abstract: The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved conventional network boundaries. The workforce is more distributed, with remote workers who need access to resources anytime, anywhere, and on any device, to support the mission. Enterprises must evolve...

Publications NISTIR 8286 October 13, 2020
https://csrc.nist.rip/publications/detail/nistir/8286/final

Abstract: The increasing frequency, creativity, and severity of cybersecurity attacks means that all enterprises should ensure that cybersecurity risk is receiving appropriate attention within their enterprise risk management (ERM) programs. This document is intended to help individual organizations within an...

Publications NISTIR 8183 Rev. 1 October 7, 2020
https://csrc.nist.rip/publications/detail/nistir/8183/rev-1/final

Abstract: This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The “Manufacturing Profile” of the CSF can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals a...

Publications White Paper NIST CSWP 17 ipd (Draft) October 1, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/10/01/securing-data-integrity-against-ransomware-attacks/draft

Abstract: The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) is actively engaged in helping organizations address the challenge of ransomware and other data integrity events through the Data Integrity projects. These projects help organizations...

Publications Journal Article October 1, 2020
https://csrc.nist.rip/publications/detail/journal-article/2020/moving-beyond-check-the-box-compliance

Journal: Computer (IEEE Computer) Abstract: Security awareness training requirements set a minimum baseline for introducing security practices to an organization's workforce. But is simple compliance enough to result in behavior change?

Publications SP 1800-11 September 22, 2020
https://csrc.nist.rip/publications/detail/sp/1800-11/final

Abstract: Businesses face a near-constant threat of destructive malware, ransomware, malicious insider activities, and even honest mistakes that can alter or destroy critical data. These data corruption events could cause a significant loss to a company’s reputation, business operations, and bottom line. T...

Publications Conference Proceedings September 17, 2020
https://csrc.nist.rip/publications/detail/conference-paper/2020/09/17/towards-usable-updates-for-smart-home-devices

Conference: 10th International Workshop on Socio-technical Aspects in Security (STAST 2020) Abstract: Smart home device updates are important tools for users to remediate security vulnerabilities and protect devices from future attacks. However, no prior research has been conducted to understand smart home users' perceptions of and experiences with updates. To address this gap, we conducted an in-de...

Publications SP 1800-21 September 15, 2020
https://csrc.nist.rip/publications/detail/sp/1800-21/final

Abstract: Mobile devices provide access to vital workplace resources while giving employees the flexibility to perform their daily activities. Securing these devices is essential to the continuity of business operations. While mobile devices can increase efficiency and productivity, they can also leave sen...

Publications White Paper NIST CSWP 16 ipd (Draft) September 8, 2020
https://csrc.nist.rip/publications/detail/white-paper/2020/09/08/trusted-iot-device-network-layer-onboarding-and-lcm/draft

Abstract: Internet of Things (IoT) devices are typically connected to a network. The steps performed to provision a device with its network credentials are referred to as network-layer onboarding (or simply, onboarding). This paper proposes a taxonomy for IoT device onboarding that can clearly express the cap...

<< first   < previous   33     34     35     36     37     38     39     40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57  next >  last >>