U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2226 through 2250 of 13539 matching records.
Publications Conference Proceedings August 10, 1981
https://csrc.nist.rip/publications/detail/conference-paper/1981/08/10/proceedings-4th-seminar-dod-computer-security-initiative

Conference: 4th Seminar on the DoD Computer Security Initiative Abstract: The Proceedings of the Fourth Seminar of the DoD Computer Security Initiative, held August 10-12, 1981, in Gaithersburg, Maryland. [This seminar later became the National Computer Security Conference, in 1985.]

Publications Conference Proceedings November 18, 1980
https://csrc.nist.rip/publications/detail/conference-paper/1980/11/18/proceedings-3rd-seminar-dod-computer-security-initiative

Conference: 3rd Seminar on the DoD Computer Security Initiative Program Abstract: The Proceedings of the Third Seminar of the DoD Computer Security Initiative, held November 18-20, 1980, in Gaithersburg, Maryland. [This seminar later became the National Computer Security Conference, in 1985.]

Publications Conference Proceedings January 15, 1980
https://csrc.nist.rip/publications/detail/conference-paper/1980/01/15/proceedings-2nd-seminar-dod-computer-security-initiative

Conference: 2nd Seminar on the DoD Computer Security Initiative Program Abstract: The Proceedings of the Second Seminar of the DoD Computer Security Initiative, held January 15-17, 1980, in Gaithersburg, Maryland. [This seminar later became the National Computer Security Conference, in 1985.]

Publications Conference Proceedings July 17, 1979
https://csrc.nist.rip/publications/detail/conference-paper/1979/07/17/proceedings-first-seminar-dod-computer-security-initiative

Conference: Seminar on the DoD Computer Security Initiative Program Abstract: The Proceedings of the [first] Seminar of the DoD Computer Security Initiative, held July 17-18, 1979, in Gaithersburg, Maryland. [This seminar later became the National Computer Security Conference, in 1985.]

Publications White Paper NBS Technical Note (TN) 906 June 1, 1976
https://csrc.nist.rip/publications/detail/white-paper/1976/06/01/nbs-tn-906/final

Abstract: Cost becomes an early concern in applying privacy safeguards to any computerized record-keeping system. To determine privacy cost impact one requires a concrete and rigorous approach that permits repeated analysis of carefully documented assumptions. Such a methodology appears in the work reported i...

Publications Conference Proceedings October 7, 1975
https://csrc.nist.rip/publications/detail/conference-paper/1975/10/07/encryption-protection-in-computer-data-communications

Conference: 4th Data Communications Symposium Abstract: Encryption can be an effective process for protecting data during transmission within distributed computer systems and networks. The degree of protection provided by encryption depends on the encryption algorithm employed, the implementation of the algorithm and the administrative procedures regulat...

Publications White Paper NBS Technical Note (TN) 876 August 1, 1975
https://csrc.nist.rip/publications/detail/white-paper/1975/08/01/nbs-tn-876/final

Abstract: On February 20, 1975, nine informed EDP professionals were invited by the Systems and Software Division of the Institute for Computer Sciences and Technology to discuss the costs Federal agencies should anticipate in complying with the Privacy Act of 1974. The invitees came from Federal agencies, pr...

Publications White Paper NBS Technical Note (TN) 827 May 1, 1974
https://csrc.nist.rip/publications/detail/white-paper/1974/05/01/nbs-tn-827/final

Abstract: A report has been prepared of the NBS/ ACM Workshop on Controlled Accessibility, December 1972, Rancho Santa Fe, California. The Workshop was divided into five separate working groups: access controls, audit, EDP management controls, identification, and measurements. The report contains t...

Publications White Paper NBS Technical Note (TN) 809 February 1, 1974
https://csrc.nist.rip/publications/detail/white-paper/1974/02/01/nbs-tn-809/final

Abstract: This publication summarizes the proceedings of a conference held for the purpose of highlighting the needs and problems of Federal, State, and local governments in safeguarding individual privacy and protecting confidential data contained in computer systems from loss or misuse. The Conference was h...

Publications Book January 1, 1974
https://csrc.nist.rip/publications/detail/book/1974/executive-guide-to-computer-security

Abstract: This booklet has been prepared for an audience of executives and managers, other than computer and ADP managers, in organizations using computers to help them understand the necessity for computer security and the problems encountered in providing for it. There are still many gaps in our knowledge....

Publications White Paper NBS Technical Note (TN) 780 June 1, 1973
https://csrc.nist.rip/publications/detail/white-paper/1973/06/01/nbs-tn-780/final

Abstract: A bibliography of 96 references on controlled accessibility has been compiled. The purpose in compiling this limited bibliography was to free the effort to solve the problems of controlled accessibility from domination by discussion of the issues of privacy. Insofar as possible, except when the two...

Updates August 18, 2022
https://csrc.nist.rip/news/2022/nist-publishes-sp-800-108-revision-1

NIST is pleased to announce the release of Special Publication (SP) 800-108r1, Recommendation for Key Derivation Using Pseudorandom Functions.

Updates August 12, 2022
https://csrc.nist.rip/news/2022/nist-requests-comments-on-ir-8214b-initial-public

NIST requests public comments on the initial public draft (ipd) of NIST IR 8214B, Notes on Threshold EdDSA/Schnorr Signatures. 

Updates August 9, 2022
https://csrc.nist.rip/news/2022/draft-sp-1800-35-volume-c-and-d-public-comment

The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE) invites public comments on volumes C-D of a preliminary draft practice guide “Implementing a Zero Trust Architecture”. Deadline to submit comments is September 9, 2022.

Updates August 5, 2022
https://csrc.nist.rip/news/2022/nist-requests-comments-on-draft-sp-800-215

The initial public draft of NIST Special Publication (SP) 800-215, Guide to a Secure Enterprise Network Landscape, provides guidance for navigating this new enterprise network landscape from a secure operations perspective. The deadline to submit comments is September 19, 2022.

Updates July 21, 2022
https://csrc.nist.rip/news/2022/nist-releases-sp-800-221-and-221a-for-comment

NIST is posting two draft Special Publications (SP) on the Enterprise Impact of Information and Communications Technology (ICT) Risk, with a public comment period open through September 6, 2022.

Updates July 21, 2022
https://csrc.nist.rip/news/2022/nist-releases-draft-nist-sp-800-66-rev-2

The initial public draft of NIST Special Publication (SP) 800-66r2 (Revision 2), Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule:  A Cybersecurity Resource Guide, is now available for public comment. Deadline to submit comments is September 21, 2022.

Updates July 21, 2022
https://csrc.nist.rip/news/2022/nccoe-releases-draft-for-devsecops

The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps. 

Updates July 20, 2022
https://csrc.nist.rip/news/2022/nist-internal-report-8235

NIST announces the publication of NIST Internal Report 8235, "Security Guidance for First Responder Mobile and Wearable Devices."

Updates July 19, 2022
https://csrc.nist.rip/news/2022/protecting-cui-pubs-pre-draft-call-for-comments

NIST seeks information for a planned update of the Controlled Unclassified Information series of publications (SP 800-171, -171A, -172, and -172A). The public comment period is open through September 16, 2022.

Updates July 13, 2022
https://csrc.nist.rip/news/2022/1st-comment-period-for-sp800-53-pub-comment-site

Participate in the inaugural 30-day comment period for a minor (errata) release of SP 800-53 Rev. 5. Submit your comments on proposed changes through August 12, 2022.

Updates July 5, 2022
https://csrc.nist.rip/news/2022/pqc-candidates-to-be-standardized-and-round-4

NIST is announcing four Post-Quantum Cryptography candidates for standardization, plus candidates for a fourth round of analysis.

Updates June 29, 2022
https://csrc.nist.rip/news/2022/initial-public-draft-nist-ir-8323r1-comment

The initial public draft of NIST IR 8323r1, Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services, is available for comment. Public comment period is open through August 12, 2022.

Updates June 24, 2022
https://csrc.nist.rip/news/2022/nist-releases-new-guidance-and-resources-on-macos

NIST has released the final version of Special Publication (SP) 800-219, Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP). 

Updates June 23, 2022
https://csrc.nist.rip/news/2022/submit-comments-on-final-draft-nist-sp-1800-34

The National Cybersecurity Center of Excellence (NCCoE) has released the initial public draft of NIST SP 1800-34, Validating the Integrity of Computing Devices. Comments are due July 25, 2022.

<< first   < previous   78     79     80     81     82     83     84     85     86     87     88     89     90     91     92     93     94     95     96     97     98     99     100     101     102  next >  last >>