As a leading provider of Media Oriented Systems Transport (MOST Helping you find what you need to know about education in New Zealand. An education web portal provided by the New Zealand Ministry of Education. Learn why the Common Core is important for your child. What parents should know; Myths vs. Our goal is to provide accurate, timely and organized information, while ensuring our website and documents are accessible to everyone. During this initial phase. Read the Latest and Breaking IT and Technology News, Reviews, Analysis & Opinion for Australian IT managers and professionals.During this initial phase, only information that has been thoroughly reviewed will be available online. Use our menus and search bar to navigate our website. If you need something that is not currently posted, please contact us. NIST Computer Security Publications - NIST Special Publications (SPs)NIST uses three NIST Special Publication subseries to publish computer/cyber/information security and guidelines, recommendations and reference materials: SP 8. Computer Security (December 1. NIST's primary mode of publishing computer/cyber/information security guidelines, recommendations and reference materials(SP 8. NIST Library Catalog); SP 1. NIST Cybersecurity Practice Guides (2. A new subseries created to complement the SP 8. SP 5. 00, Computer Systems Technology (January 1. A general IT subseries used more broadly by NIST's Information Technology Laboratory (ITL), this page lists selected SP 5. NIST's computer security efforts. See more details about DOIs. SP 8. 00s - Computer Security. SP 8. 00- 1. 88 (Draft)August 2. DRAFT De- Identifying Government Datasets. Announcement and Draft Publication. SP 8. 00- 1. 85 (Draft)August 2. DRAFT SHA- 3 Derived Functions: c. SHAKE, KMAC, Tuple. Hash, and Parallel. Hash. Announcement and Draft Publication. SP 8. 00- 1. 84 (Draft)June 2. DRAFT Guide for Cybersecurity Event Recovery. Announcement and Draft Publication. SP 8. 00- 1. 83. July 2. Networks of 'Things'SP 8. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. Draft)August 2. 01. DRAFT Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Announcement and Draft Publication. SP 8. 00- 1. 71. June 2. Updated 1/1. 4/2. Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. SP 8. 00- 1. 71 (including updates as of 0. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. Federal Cryptographic Key Management Systems (CKMS)SP 8. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. December 2. 01. 1 Recommendation for Existing Application- Specific Key Derivation Functions. SP 8. 00- 1. 35 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. November 2. 01. 5 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. SP 8. 00- 1. 31. A Rev. Ar. 1 . 3 (Draft)July 2. DRAFT The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1. Announcement and Draft Publication. SP 8. 00- 1. 26 Rev. September 2. 01. 1 (Updated 3/1. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1. SP 8. 00- 1. 26 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. February 2. 01. 1 The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1. SP 8. 00- 1. 26 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. June 2. 01. 3 Guidelines for Managing the Security of Mobile Devices in the Enterprise. SP 8. 00- 1. 24 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. EPUB) FAQPress Release. SP 8. 00- 1. 23. July 2. Guide to General Server Security. SP 8. 00- 1. 23. FAQdoi: 1. NIST. SP. 8. 00- 1. June 2. 01. 2 Guide to Bluetooth Security. SP 8. 00- 1. 21 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. Draft)January 2. 01. DRAFT Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1. Announcement and Draft Publication. SP 8. 00- 1. 17. July 2. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1. SP 8. 00- 1. 17. FAQdoi: 1. NIST. SP. 8. 00- 1. Draft)December 2. DRAFT A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)Announcement and Draft Publication. SP 8. 00- 1. 16. November 2. A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)SP 8. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. July 2. 01. 6User's Guide to Telework and Bring Your Own Device (BYOD) Security. SP 8. 00- 1. 14 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. August 2. 01. 2 Recommendation for Applications Using Approved Hash Algorithms. SP 8. 00- 1. 07 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. May 2. 01. 4 Guidelines on Mobile Device Forensics. SP 8. 00- 1. 01 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 1. Draft)July 2. 01. DRAFT Guide to Intrusion Detection and Prevention Systems (IDPS)Announcement and Draft Publication. SP 8. 00- 9. 4February 2. Guide to Intrusion Detection and Prevention Systems (IDPS)SP 8. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 9. June 2. 01. 5 Recommendation for Random Number Generation Using Deterministic Random Bit Generators. SP 8. 00- 9. 0A Revision 1. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 9. Ar. 1 . 1. December 2. Guidelines for Media Sanitization. SP 8. 00- 8. 8 Revision 1. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 8. April 2. 00. 8 Codes for Identification of Federal and Federally- Assisted Organizations. SP 8. 00- 8. 7 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 8. July 2. 01. 3 Guide to Malware Incident Prevention and Handling for Desktops and Laptops. SP 8. 00- 8. 3 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 8. May 2. 01. 5 Guide to Industrial Control Systems (ICS) Security. SP 8. 00- 8. 2 Revision 2. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 8. December 2. 01. 5 National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. SP 8. 00- 7. 0 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 7. October 2. 00. 8 Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist. SP 8. 00- 6. 8 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 6. January 2. 01. 2 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. SP 8. 00- 6. 7 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 6. October 2. 00. 8 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. SP 8. 00- 6. 6 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 6. October 2. 00. 8 Security Considerations in the System Development Life Cycle. SP 8. 00- 6. 4 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 6. August 2. 01. 2 Computer Security Incident Handling Guide. SP 8. 00- 6. 1 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 6. August 2. 00. 8 Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. SP 8. 00- 6. 0 Vol. Appendices. FAQdoi: 1. NIST. SP. 8. 00- 6. August 2. 00. 8 Guide for Mapping Types of Information and Information Systems to Security Categories. SP 8. 00- 6. 0 Vol. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 6. January 2. 01. 6 Recommendation for Key Management, Part 1: General. SP 8. 00- 5. 7 Part 1, Revision 4. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. SP 8. 00- 5. 7 Part 2. August 2. 00. 5 Recommendation for Key Management, Part 2: Best Practices for Key Management Organization. SP 8. 00- 5. 7 Part 2. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. January 2. 01. 5 Recommendation for Key Management, Part 3: Application- Specific Key Management Guidance. SP 8. 00- 5. 7 Part 3, Revision 1. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. May 2. 01. 3 Recommendation for Pair- Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. SP 8. 00- 5. 6A Revision 2. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. Ar. 2 . 1. September 2. Recommendation for Pair- Wise Key- Establishment Schemes Using Integer Factorization Cryptography. SP 8. 00- 5. 6B Revision 1. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. Br. 1 . 1. July 2. Performance Measurement Guide for Information Security. SP 8. 00- 5. 5 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. December 2. 01. 4 (Updated 1. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. SP 8. 00- 5. 3A Revision 4. Ar. 4 . 4 (1. 2- 1. XML file for SP 8. A Rev. 4 (0. 6- 1. Press Release. SP 8. Rev. 5 (Draft)February 2. DRAFT PRE- DRAFT Call for Comments: Security and Privacy Controls for Federal Information Systems and Organizations. Announcement and Draft Publication. SP 8. 00- 5. 3 Rev. April 2. 01. 3 (Updated 1/2. Security and Privacy Controls for Federal Information Systems and Organizations. SP 8. 00- 5. 3 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. XML file for SP 8. Rev. 4 (0. 1- 1. 5- 2. Summary of NIST SP 8. Revision 4. Press Release (0. Pre- Draft Call for Comments for SP 8. Rev. 1. April 2. 01. Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. SP 8. 00- 5. 2 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. February 2. 01. 1 Guide to Using Vulnerability Naming Schemes. SP 8. 00- 5. 1 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 5. July 2. 00. 8 Guide to Securing Legacy IEEE 8. Wireless Networks. SP 8. 00- 4. 8 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 4. July 2. 01. 6Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. SP 8. 00- 4. 6 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 4. September 2. 00. 9 Guidelines on Firewalls and Firewall Policy. SP 8. 00- 4. 1 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 4. July 2. 01. 3 Guide to Enterprise Patch Management Technologies. SP 8. 00- 4. 0 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 4. February 2. 01. 0 (Updated 6/5/2. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach. SP 8. 00- 3. 7 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 3. May 2. 01. 0 (Updated 1. Contingency Planning Guide for Federal Information Systems. SP 8. 00- 3. 4 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 3. Contingency Planning: Low Impact System Template (SP 8. Rev. 1)Contingency Planning: Moderate Impact System Template (SP 8. Rev. 1)Contingency Planning: High Impact System Template (SP 8. Rev. 1)SP 8. 00- 3. December 2. 00. 1 Underlying Technical Models for Information Technology Security. SP 8. 00- 3. 3FAQdoi: 1. NIST. SP. 8. 00- 3. September 2. 01. 2 Guide for Conducting Risk Assessments. SP 8. 00- 3. 0 Rev. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 3. EPUB) FAQPress Release. SP 8. 00- 2. 9June 2. A Comparison of the Security Requirements for Cryptographic Modules in FIPS 1. FIPS 1. 40- 2. SP 8. FAQdoi: 1. 0. 6. 02. NIST. SP. 8. 00- 2. AJune 2. 00. 4 Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision ASP 8. Rev. AFAQdoi: 1. 0. NIST. SP. 8. 00- 2. A . 1a. April 2. 01.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |