U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 201 through 225 of 13546 matching records.
Topics https://csrc.nist.rip/topics/security-and-privacy/security-programs-and-operations/contingency-planning

Information system contingency planning refers to a coordinated strategy involving plans, procedures, and technical measures that enable the recovery of information systems, operations, and data after a disruption. Contingency planning generally includes one or more of the following approaches to restore disrupted services: Restoring information systems using alternate equipment; Performing some or all of the affected business processes using alternate processing (manual) means (typically acceptable for only short-term disruptions); Recovering information systems operations at an...

Topics https://csrc.nist.rip/topics/security-and-privacy/security-programs-and-operations/incident-response

"The mitigation of violations of security policies and recommended practices." (SP 800-61 Rev. 2)

Topics https://csrc.nist.rip/topics/security-and-privacy/security-programs-and-operations/media-protection

Security controls related to media protection include media: i) policies and procedures, ii) access, iii) marking, iv) storage, v) transport, vi) sanitization, vii) use, and viii) downgrading. (SP 800-53, Appendix F-MP)

Topics https://csrc.nist.rip/topics/security-and-privacy/security-programs-and-operations/patch-management

The process for identifying, acquiring, installing, and verifying patches for products and systems. Patches correct security and functionality problems in software and firmware. From a security perspective, patches are most often of interest because they are mitigating software flaw vulnerabilities; applying patches to eliminate these vulnerabilities significantly reduces the opportunities for exploitation. Also, patches are usually the most effective way to mitigate software flaw vulnerabilities, and are often the only fully effective solution. (SP 800-40 Rev. 3)

Topics
49%
https://csrc.nist.rip/topics/security-and-privacy/security-and-behavior/behavior

Includes the behavior of systems, devices, applications and people.

Topics https://csrc.nist.rip/topics/sectors/energy/smart-grid

NIST's cybersecurity resources have supported NIST's smart grid development efforts, which resulted from the Energy Independence and Security Act of 2007 (EISA). RT=EISA

Topics https://csrc.nist.rip/topics/security-and-privacy/systems-security-engineering/trustworthiness

Trustworthiness is a concept that includes: privacy, reliability, resilience, safety, and security. Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, business function, enterprise, or other entity. [SP 800-160 Volume 2, Appendix B]

Topics https://csrc.nist.rip/topics/technologies/hardware/personal-computers

Personal computing devices such as dektop and laptop computers.

Topics
49%
https://csrc.nist.rip/topics/technologies/hardware/sensors

"A device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument. A sensor is a device, which responds to an input quantity by generating a functionally related output usually in the form of an electrical or optical signal." (SP 800-82 Rev. 2)

Topics
49%
https://csrc.nist.rip/topics/technologies/networks/firewalls

"A device or program that controls the flow of network traffic between networks or hosts that employ differing security postures." (SP 800-41 Rev. 1)

<< first   < previous   1     2     3     4     5     6     7     8     9     10     11     12     13     14     15     16     17     18     19     20     21     22     23     24     25  next >  last >>