U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1301 through 1325 of 13539 matching records.
Publications Journal Article July 25, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/a-survey-of-physics-based-attack-detection-in-cps

Journal: ACM Computing Surveys Abstract: Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements to identify potentially false contro...

Publications SP 1800-2 July 13, 2018
https://csrc.nist.rip/publications/detail/sp/1800-2/final

Abstract: To protect power generation, transmission, and distribution, energy companies need to control physical and logical access to their resources, including buildings, equipment, information technology (IT), and operational technology (OT). They must authenticate authorized individuals to the devices and...

Publications Journal Article July 13, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/in-iot-we-trust?

Journal: IEEE IoT Newsletter Abstract: In this short article, we review an abbreviated list of trust challenges that we foresee as increased adoption transforms the IoT into another ubiquitous technology just as the Internet is. These challenges are in no specific order, and are by no means a full set.

Publications Conference Proceedings July 10, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/07/10/assessing-attack-impact-on-business-processes

Conference: IFIP Annual Conference on Data and Applications Security and Privacy Abstract: Cyber-defense and cyber-resilience techniques sometimes fail in defeating cyber-attacks. One of the primary causes is the ineffectiveness of business process impact assessment in the enterprise network. In this paper, we propose a new business process impact assessment method, which measures the imp...

Publications Conference Proceedings July 10, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/07/10/insider-threat-of-remote-administrators-in-clouds

Conference: IFIP Annual Conference on Data and Applications Security and Privacy Abstract: As today’s cloud providers strive to attract customers with better services and less downtime in a highly competitive market, they increasingly rely on remote administrators including those from third party providers for fulfilling regular maintenance tasks. In such a scenario, the privileges grante...

Publications SP 800-71 (Draft) July 2, 2018
https://csrc.nist.rip/publications/detail/sp/800-71/draft

Abstract: This recommendation addresses the protection of symmetric keying material during a key establishment that uses symmetric-key cryptography for key distribution. The objective is to provide recommendations for reducing exposure to the unauthorized disclosure of the keying material and detecting its un...

Publications SP 800-203 July 2, 2018
https://csrc.nist.rip/publications/detail/sp/800-203/final

Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The prim...

Publications Conference Proceedings July 1, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/07/01/pseudo-exhaustive-verification-of-rule-based-systems

Conference: The 30th International Conference on Software Engineering & Knowledge Engineering (SEKE 2018) Abstract: Rule-based systems are important in application domains such as artificial intelligence and business rule engines. When translated into an implementation, simple expressions in rules may map to a large body of code that requires testing. We show how rule-based systems may be tested efficiently, usin...

Publications SP 800-116 Rev. 1 June 29, 2018
https://csrc.nist.rip/publications/detail/sp/800-116/rev-1/final

Abstract: This recommendation provides a technical guideline to use Personal Identity Verification (PIV) Cards in facility access; enabling federal agencies to operate as government-wide interoperable enterprises. These guidelines cover the risk-based strategy to select appropriate PIV authentication mechanis...

Publications Book Section June 27, 2018
https://csrc.nist.rip/publications/detail/book/2018/expressing-and-exchanging-cyber-investigation-information

In: Handling and Exchanging Electronic Evidence Across Europe Abstract: This paper describes the evolution of a community-developed, standardized specification language for representing and exchanging information in the broadest possible range of cyber-investigation domains, including digital forensic science, incident response, and counter terrorism. A primary motivati...

Publications ITL Bulletin June 26, 2018
https://csrc.nist.rip/publications/detail/itl-bulletin/2018/06/a-model-process-for-criticality-analysis/final

Abstract: This bulletin summarizes the information found in NISTIR 8179: Criticality Analysis Process Model, which describes a structured method of prioritizing programs, systems, and components based on their importance to the goals of an organization and the impact that their inadequate operation or loss ma...

Publications Journal Article June 26, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/baseline-tailor

Journal: Journal of the National Institute of Standards and Technology Abstract: Baseline Tailor is an innovative web application for users of the National Institute of Standards and Technology (NIST) Cybersecurity Framework and Special Publication (SP) 800-53. Baseline Tailor makes the information in these widely referenced publications easily accessible to both security profes...

Publications SP 800-171A June 13, 2018
https://csrc.nist.rip/publications/detail/sp/800-171a/final

Abstract: The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its assigned missions and business operations. This public...

Publications Conference Proceedings June 12, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/06/12/parallel-self-testing-of-the-ghz-state-with-a-proof-by-diagrams

Conference: 15th International Conference on Quantum Physics and Logic Abstract: Quantum self-testing addresses the following question: is it possible to verify the existence of a multipartite state even when one's measurement devices are completely untrusted? This problem has seen abundant activity in the last few years, particularly with the advent of parallel self-testing (i....

Publications Journal Article June 11, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/iot-metrology

Journal: IT Professional Abstract: In the Internet of Things (IoT), what can we measure? The authors explore how the field of metrology might be applicable to the IoT.

Publications SP 800-125A Rev. 1 June 7, 2018
https://csrc.nist.rip/publications/detail/sp/800-125a/rev-1/final

Abstract: The Hypervisor platform is a collection of software modules that provides virtualization of hardware resources (such as CPU, Memory, Network and Storage) and thus enables multiple computing stacks (made of an operating system (OS) and application programs) called Virtual Machines (VMs) to be run on...

Publications Journal Article June 1, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/stakeholder-id-and-representation-of-iot-apps-in-healthcare

Journal: IEEE Systems Journal Abstract: We describe the initial process of eliciting requirements for an Internet-of-things (IoT) application involving a hospital emergency room. First, we discuss the process of modeling IoT systems through rich pictures and use cases. Then, we demonstrate how these can be used to model emergency room sys...

Publications White Paper May 31, 2018
https://csrc.nist.rip/publications/detail/white-paper/2018/05/31/extracting-linearization-equations-from-noisy-sources/final

Abstract: This note was originally written under the name "On the Security of HMFEv" and was submitted to PQCrypto 2018. The author was informed by the referees of his oversight of an eprint work of the same name by Hashimoto, see eprint article /2017/689/, that completely breaks HMFEv, rendering the result o...

Publications White Paper May 30, 2018
https://csrc.nist.rip/publications/detail/white-paper/2018/05/30/supporting-growth-and-sustainment-of-the-cybersecurity-workforce/final

Abstract: This report responds to the May 11, 2017, Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. That order directs the Secretary of Commerce and the Secretary of Homeland Security to: 1) Assess the scope and sufficiency of efforts to educate and train th...

Publications White Paper May 30, 2018
https://csrc.nist.rip/publications/detail/white-paper/2018/05/30/enhancing-resilience-against-botnets--report-to-the-president/final

Abstract: This report outlines a guide to government and private sector actions that would reduce the threat of botnets and similar cyberattacks. It responds to the May 11, 2017, Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. That order directed the Secreta...

Publications ITL Bulletin May 23, 2018
https://csrc.nist.rip/publications/detail/itl-bulletin/2018/05/protecting-software-integrity-through-code-signing/final

Abstract: This bulletin summarizes the information found in the white paper Security Considerations for Code Signing, which describes features and architectural relationships of typical code signing solutions that are widely deployed today. The paper also defines use cases and identifies security problems tha...

Publications SP 800-202 May 10, 2018
https://csrc.nist.rip/publications/detail/sp/800-202/final

Abstract: This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone, tablet, etc. The guide discusses techniques and considerations for preparing the internal memory of a mobile device for use in testing a mob...

Publications SP 800-193 May 4, 2018
https://csrc.nist.rip/publications/detail/sp/800-193/final

Abstract: This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks.  The platform is a collection of fundamental hardware and firmware components needed to boot and operate a system. A successful attack on...

Publications ITL Bulletin April 25, 2018
https://csrc.nist.rip/publications/detail/itl-bulletin/2018/04/improving-the-trustworthiness-of-email/final

Abstract: This bulletin summarizes the information found in NIST SP 1800-6: Domain Name System-Based Electronic Mail Security, which describes a security platform for trustworthy email exchanges across organizational boundaries.

Publications NISTIR 7511 Rev. 5 April 20, 2018
https://csrc.nist.rip/publications/detail/nistir/7511/rev-5/final

Abstract: This report defines the requirements and associated test procedures necessary for products or modules to achieve one or more Security Content Automation Protocol (SCAP) validations.  Validation is awarded based on a defined set of SCAP capabilities by independent laboratories that have been acc...

<< first   < previous   41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59     60     61     62     63     64     65  next >  last >>