U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 176 through 200 of 13536 matching records.
Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/cyberspace-policy-review

The Cyberspace Policy Review (May 2009) served as a driver for both the National Strategy for Trusted Identities in Cyberspace (NSTIC) and the National Initiative for Cybersecurity Education (NICE).  

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/eo-13636

Improving Critical Infrastructure Cybersecurity (February 12, 2013) initiated development of the Cybersecurity Framework (CSF).

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/eo-13702

Creating a National Strategic Computing Initiative (July 29, 2015)

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/eo-13718

Commission on Enhancing National Cybersecurity (February 9, 2016)

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/eo-13800

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (May 11, 2017)

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/hspd-7

Critical Infrastructure Identification, Prioritization, and Protection (December 17, 2003).

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/hspd-12

Policy for a Common Identification Standard for Federal Employees and Contractors (August 27, 2004) initiated the development effort for FIPS 201 and other publications and testing related to Personal Identity Verification (PIV).

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/omb-a-11

Office of Management and Budget (OMB) Circular A-11, Preparation, Submission, and Execution of the Budget (updated annually)

Topics https://csrc.nist.rip/topics/laws-and-regulations/executive-documents/omb-a-130

Office of Management and Budget (OMB) Circular A-130, Managing Information as a Strategic Resource (July 28, 2016).

Topics https://csrc.nist.rip/topics/security-and-privacy/risk-management/vulnerability-management

Vulnerabilities are "weaknesses in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source." [SP 800-37 Rev. 2, Appendix B]

<< first   < previous   1     2     3     4     5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25  next >  last >>