Computer security + Standards -- United States
Label
Computer security + Standards -- United States
Name
Computer security + Standards
Actions
Incoming Resources
- Cryptographic algorithms and key sizes for Personal Identity Verification, W. Timothy Polk, Donna F. Dodson, William E. Burr
- Best practices for keeping your home network secure
- Guide to using vulnerability naming schemes, recommendations of the National Institute of Standards and Technology, David Waltermire, Karen Scarfone
- Guidelines on electronic mail security, recommendations of the National Institute of Standards and Technology, Miles Tracy ... [and others]
- Recommendation for obtaining assurances for digital signature applications, Elaine Barker
- Recommendation for block cipher modes of operation, Galois/Counter mode (GCM) for confidentiality and authentication, Morris Dworkin
- As allowed by its standard, FHFA closed three Fannie Mae cybersecurity MRAs after independently determining the enterprise completed its planned remedial actions
- Defense acquisitions, DOD's Cybersecurity Maturity Model Certification framework, Heidi M. Peters
- Security Content Automation Protocol (SCAP) version 1.0 validation program test requirements (draft), Peter Mell ... [et. al.]
- Recommendation for random bit generator (RBG) constructions, Elaine Barker, John Kelsey
- Guide for assessing the security controls in federal information systems, Ron Ross ... [and others]
- Recommended security controls for federal information systems, Ron Ross ... [and others]
- Integrating IT security into the capital planning and investment control process, Joan Hash ... [and others]
- Recommended security controls for federal information systems, public draft, Ron Ross ... [and others]
- Recommendation for obtaining assurances for digital signature applications, Elaine Barker
- Recommendation for pair-wise key establishment schemes using integer factorization cryptography, Elaine Barker ... [and others]
- Security assessment provider requirements and customer responsibilities, building a security assessment credentialing program for federal information systems : initial public draft, Arnold Johnson, Pat Toth
- Guidelines on active content and mobile code, recommendations of the National Institute of Standards and Technology, Wayne A. Jansen
- Performance measurement guide for information security, Elizabeth Chew ... [and others]
- A framework for designing cryptographic key management systems, Elaine Barker ... [and others]
- Recommendation for password-based key derivation, Meltem Sönmez Turan ... [and others]
- Guide to computer security log management, recommendations of the National Institute of Standards and Technology, Murugiah Souppaya, Karen Kent
- Recommendation for random number generation using deterministic random bit generators (revised), Elaine Barker, John Kelsey
- Guide to computer security log management, recommendations of the National Institute of Standards and Technology, Karen Kent, Murugiah Souppaya
- Common remediation enumeration (CRE) version 1.0 (draft), Gerald T. McGuire, David Waltermire, Jonathon O. Baker
- Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography, (revised), Elaine Baker, Don Johnson, and Miles Smid
- Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme, recommendations of the National Institute of Standards and Technology, Peter Mell, Tim Grance
- Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography, Elaine Baker, Don Johnson, and Miles Smid
- Best practices for keeping your home network secure
- Recommended security controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Cybersecurity certification recommendations for interconnected grid devices and inverter based resources, William Hupp [and 3 others]
- Recommendation for block cipher modes of operation, the CMAC mode for authentication, Morris Dworkin
- Recommendation for block cipher modes of operation, the CCM mode for authentication and confidentiality, Morris Dworkin
- Guidelines on electronic mail security, recommendations of the National Institute of Standards and Technology, Miles Tracy, Wayne Jansen, and Scott Bisker
- Guidelines for the selection and use of Transport Layer Security (TLS) implementations, recommendations of the National Institute of Standards and Technology, C. Michael Chernick ... [and others]
- Guidelines on PDA forensics, recommendations of the National Institute of Standards and Technology, Wayne Jansen, Rick Ayers
- Cybersecurity certification standard for distributed energy & inverter-based resources, Danish Saleem, Michael Slowinske
- Transitions, recommendation for transitioning the use of cryptographic algorithms and key lengths, Elaine Barker and Allen Roginsky
- Guide to security for full virtualization technologies, recommendations of the National Institute of Standards and Technology, Karen Scarfone, Murugiah Souppaya, Paul Hoffman
- Trust model for security automation data 1.0 (TMSAD), Harold Booth, Adam Halbardier
- A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2, Ray Snouffer, Annabelle Lee, and Arch Oldehoeft
- Guideline for the use of advanced authentication technology alternatives
- Generally accepted principles and practices for securing information technology systems, Marianne Swanson, Barbara Guttman
- An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, Matthew Scholl ... [and others]
- Digital Signature Standard (DSS)
- Recommendation for the entropy sources used for random bit generator, Elaine Barker, John Kelsey
- The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1, recommendations of the National Institute of Standards and Technology, David Waltermire, Stephen Quinn, Karen Scarfone
- Guide for information security program assessments and system reporting form, Marianne Swanson ... [and others]
- Federal S/MIME V3 client profile, recommendations of the National Institute of Standards and Technology, C. Michael Chernick
- Recommendation for block cipher modes of operation, the XTS-AES mode for confidentiality on block-oriented storage devices, Morris Dworkin