Computer security + Standards -- United States
Label
Computer security + Standards -- United States
Name
Computer security + Standards
Actions
Incoming Resources
- Guidelines on electronic mail security, recommendations of the National Institute of Standards and Technology, Miles Tracy [and others]
- Recommendation for random bit generator (RBG) constructions, Elaine Barker, John Kelsey
- Recommendation for block cipher modes of operation, Galois/Counter mode (GCM) for confidentiality and authentication, Morris Dworkin
- Recommendation for random number generation using deterministic random bit generators (revised), Elaine Barker, John Kelsey
- Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme, recommendations of the National Institute of Standards and Technology, Peter Mell, Tim Grance
- Performance measurement guide for information security, Elizabeth Chew [and others]
- Recommendation for pair-wise key establishment schemes using integer factorization cryptography, Elaine Barker [and others]
- Guide for assessing the security controls in federal information systems, Ron Ross [and others]
- A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2, Ray Snouffer, Annabelle Lee, and Arch Oldehoeft
- Recommended security controls for federal information systems, Ron Ross [and others]
- Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography, Elaine Baker, Don Johnson, and Miles Smid
- Guide to enterprise patch management technologies (draft), recommendations of the National Institute of Standards and Technology, Murugiah Souppaya, Karen Scarfone
- User's guide to securing external devices for telework and remote access, recommendations of the National Institute of Standards and Technology, Karen Scarfone, Murugiah Souppaya
- Security and privacy controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Guidelines on securing public web servers, recommendations of the National Institute of Standards and Technology, Miles Tracy, Wayne Jansen, and Mark McLamon
- Security self-assessment guide for information technology systems, Marianne Swanson
- Guidelines on active content and mobile code, recommendations of the National Institute of Standards and Technology, Wayne A. Jansen, Theodore Winograd, Karen Scarfone
- Creating a patch and vulnerability management program, recommendations of the National Institute of Standards and Technology (NIST), Peter Mell, Tiffany Bergeron, David Henning
- Common remediation enumeration (CRE) version 1.0 (draft), Gerald T. McGuire, David Waltermire, Jonathon O. Baker
- Guide to computer security log management, recommendations of the National Institute of Standards and Technology, Karen Kent, Murugiah Souppaya
- Guide for developing performance metrics for information security, recommendations of the National Institute of Standards and Technology, Elizabeth Chew [and others]
- Digital Signature Standard (DSS)
- Recommendation for the entropy sources used for random bit generator, Elaine Barker, John Kelsey
- Recommendation for password-based key derivation, Meltem Sönmez Turan [and others]
- Contingency planning guide for information technology systems, recommendations of the National Institute of Standards and Technology, Marianne Swanson [and others]
- The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1, recommendations of the National Institute of Standards and Technology, David Waltermire, Stephen Quinn, Karen Scarfone
- Generally accepted principles and practices for securing information technology systems, Marianne Swanson, Barbara Guttman
- Guide for information security program assessments and system reporting form, Marianne Swanson [and others]
- Recommendation for block cipher modes of operation, methods and techniques, Morris Dworkin
- Guidelines on securing public web servers, recommendations of the National Institute of Standards and Technology, Miles Tracy [and others]
- Recommended security controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Guidelines on active content and mobile code, recommendations of the National Institute of Standards and Technology, Wayne A. Jansen
- Guide for the security certification and accreditation of federal information systems, Ron Ross [and others]
- Cryptographic algorithms and key sizes for Personal Identity Verification, W. Timothy Polk, Donna F. Dodson, William E. Burr
- Cryptographic algorithms and key sizes for Personal Identity Verification, W. Timothy Polk, Donna F. Dodson, William E. Burr
- Recommended security controls for federal information systems and organizations, Joint Task Force Transformation Initiative
- Building an information technology security awareness and training program, Mark Wilson and Joan Hash
- Guidelines for the selection and use of Transport Layer Security (TLS) implementations, recommendations of the National Institute of Standards and Technology, C. Michael Chernick [and others]
- Contingency planning guide for federal information systems (draft), Marianne Swanson [and four others]
- Guide to selecting information technology security products, recommendations of the National Institute of Standards and Technology, Timothy Grance, Marc Stevens, Marissa Myers
- BIOS integrity measurements guidelines (draft), recommendations of the National Institute of Standards and Technology, Andrew Regenscheid, Karen Scarfone
- Recommended security controls for federal information systems, public draft, Ron Ross [and others]
- Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher, William C. Barker
- Security assessment provider requirements and customer responsibilities, building a security assessment credentialing program for federal information systems : initial public draft, Arnold Johnson, Pat Toth
- Recommendation for obtaining assurances for digital signature applications, Elaine Barker
- Risk management guide for information technology systems, recommendations of the National Institute of Standards and Technology, Gary Stoneburner, Alice Goguen, and Alexis Feringa
- Specification for the extensible configuration checklist description format (XCCDF) version 1.2, David Waltermire [and others]
- Transitions, recommendation for transitioning the use of cryptographic algorithms and key lengths, Elaine Barker and Allen Roginsky
- Guide to security for full virtualization technologies, recommendations of the National Institute of Standards and Technology, Karen Scarfone, Murugiah Souppaya, Paul Hoffman
- Trust model for security automation data 1.0 (TMSAD), Harold Booth, Adam Halbardier