U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1676 through 1700 of 13539 matching records.
Publications NISTIR 7924 (Draft) May 29, 2014
https://csrc.nist.rip/publications/detail/nistir/7924/draft

Abstract: The purpose of this document is to identify a baseline set of security controls and practices to support the secure issuance of certificates. This baseline was developed with publicly-trusted Certificate Authorities (CAs) in mind. These CAs, who issue the certificates used to secure websites using T...

Publications SP 800-101 Rev. 1 May 15, 2014
https://csrc.nist.rip/publications/detail/sp/800-101/rev-1/final

Abstract: Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile device forensics is an evolving specialty in the field of digital forensics. This guide attempts to bridge the gap by providing an in-depth lo...

Publications ITL Bulletin May 13, 2014
https://csrc.nist.rip/publications/detail/itl-bulletin/2014/05/small-and-medium-size-business-information-security-outreach-pro/final

Abstract: Small and medium-sized businesses (SMBs) represent 99.7 percent of all U.S. employers and are an important segment of the U.S. economy. These organizations, totaling more than 28.2 million, create over 60 percent of all new U.S. private-sector jobs and produce over 47 percent of the country's Gross...

Publications NISTIR 7946 April 28, 2014
https://csrc.nist.rip/publications/detail/nistir/7946/final

Abstract: This Interagency Report provides guidance to individuals scoring IT vulnerabilities using the Common Vulnerability Scoring System (CVSS) Version 2.0 scoring metrics. The guidance in this document is the result of applying the CVSS specification to score over 50,000 vulnerabilities analyzed by the Na...

Publications Conference Paper April 27, 2014
https://csrc.nist.rip/publications/detail/conference-paper/2014/04/27/using-evidence-from-security-events-for-network-attack-analysis

Conference: 11th International Workshop on Security in Information Systems (WOSIS 2014) Abstract: Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario and build an evidence graph. To achieve the accuracy...

Publications NISTIR 7991 April 8, 2014
https://csrc.nist.rip/publications/detail/nistir/7991/final

Abstract: Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies and password requirements on how users should generate and maintain their passwords, and use the passwords to authenticate and gain access...

Publications Journal Article April 4, 2014
https://csrc.nist.rip/publications/detail/journal-article/2014/nist-and-computer-security

Journal: IT Professional Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information security at both national and global levels....

Publications Conference Proceedings April 1, 2014
https://csrc.nist.rip/publications/detail/conference-paper/2014/04/01/estimating-fault-detection-effectiveness-[poster]

Conference: Third International Workshop on Combinatorial Testing (IWCT 2014) Abstract: This poster gives an overview of methods for estimating fault detection effectiveness of a test set based on combinatorial coverage for a class of software.

Publications Conference Proceedings April 1, 2014
https://csrc.nist.rip/publications/detail/conference-paper/2014/04/01/introducing-combinatorial-testing-in-a-large-organization-pilot

Conference: Third International Workshop on Combinatorial Testing (IWCT 2014) Abstract: This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT would save roughly 20% of testing cost, with 20% - 50%...

Publications Conference Proceedings April 1, 2014
https://csrc.nist.rip/publications/detail/conference-paper/2014/04/01/an-empirical-comparison-of-combinatorial-and-random-testing

Conference: Third International Workshop on Combinatorial Testing (IWCT 2014) Abstract: Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the stability of the two techniques. We measure both co...

Publications SP 800-16 Rev. 1 (Draft) March 14, 2014
https://csrc.nist.rip/publications/detail/sp/800-16/rev-1/draft

Abstract: Meeting security responsibilities and providing for the confidentiality, integrity, and availability of information in today's highly networked environment can be a difficult task. Each individual that owns, uses, relies on, or manages information and information technology (IT) systems must fully u...

Publications ITL Bulletin March 7, 2014
https://csrc.nist.rip/publications/detail/itl-bulletin/2014/03/attribute-based-access-control-abac-definition-and-considerati/final

Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or rela...

Publications NISTIR 7849 March 5, 2014
https://csrc.nist.rip/publications/detail/nistir/7849/final

Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authenticati...

Publications White Paper February 26, 2014
https://csrc.nist.rip/publications/detail/white-paper/2014/02/26/nistir-7628-user's-guide/final

Abstract: This NISTIR 7628 User's Guide is intended to provide an easy-to-understand approach that you can use to navigate the NISTIR 7628. While NISTIR 7628 covers many significant cybersecurity topics, this User's Guide is focused primarily on the application of NISTIR 7628 Volume 1 in the context of an org...

Publications ITL Bulletin February 19, 2014
https://csrc.nist.rip/publications/detail/itl-bulletin/2014/02/framework-for-improving-critical-infrastructure-cybersecurity/final

Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed NIST to work with stakeholders to develop a...

Publications White Paper NIST CSWP 2 February 19, 2014
https://csrc.nist.rip/publications/detail/white-paper/2014/02/19/summary-of-nist-sp-800-53-rev-4-security--privacy-controls/final

Abstract: This white paper provides an overview of NIST Special Publication (SP) 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations, which was published April 30, 2013.

Publications White Paper NIST CSWP 1 February 12, 2014
https://csrc.nist.rip/publications/detail/white-paper/2014/02/12/cybersecurity-framework-v10/final

Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation's security at risk. To better protect these...

Publications NISTIR 7983 February 4, 2014
https://csrc.nist.rip/publications/detail/nistir/7983/final

Abstract: Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user IDs and passwords or personal identification numbers (PINs). Many try to use the same password (or different versions of the same password) ac...

Publications Journal Article
34%
February 3, 2014
https://csrc.nist.rip/publications/detail/journal-article/2014/it-risks

Journal: IT Professional Abstract: Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some areas of risk that we have come to accept, their mit...

Publications Journal Article February 3, 2014
https://csrc.nist.rip/publications/detail/journal-article/2014/software-testing

Journal: Computer (IEEE Computer) Abstract: This special issue presents papers that focus on important problems within the Software Testing community.

Publications Journal Article February 3, 2014
https://csrc.nist.rip/publications/detail/journal-article/2014/the-importance-of-entropy-to-information-security

Journal: Computer (IEEE Computer) Abstract: The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline the difficulties in generating and estimating the...

Publications Conference Proceedings February 3, 2014
https://csrc.nist.rip/publications/detail/conference-paper/2014/02/03/real-time-access-control-rule-fault-detection-using-a-simulated-

Conference: 2013 International Conference on Social Computing (SocialCom) Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objects/attributes, and environment variables of the pr...

Publications Journal Article January 31, 2014
https://csrc.nist.rip/publications/detail/journal-article/2014/k-zero-day-safety-network-security-metric-for-measuring-risk

Journal: IEEE Transactions on Dependable and Secure Computing Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security metrics has been hindered by diffic...

Publications ITL Bulletin January 9, 2014
https://csrc.nist.rip/publications/detail/itl-bulletin/2014/01/a-profile-of-the-key-management-framework-for-the-federal-govern/final

Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Framework for Designing Cryptographic Key Management Syste...

Publications Journal Article December 31, 2013
https://csrc.nist.rip/publications/detail/journal-article/2013/a-new-standard-for-securing-media-independent-handover-ieee-802

Journal: IEEE Wireless Communications Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802 LAN/MAN Standards committee has recently fini...

<< first   < previous   56     57     58     59     60     61     62     63     64     65     66     67     68     69     70     71     72     73     74     75     76     77     78     79     80  next >  last >>