CSRC

Results: 4036



#Item
821Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Public safety / National Cyber Security Division / Cyberwarfare / Security / Computer network security

October 10, 2014 Submitted electronically to [removed] Comments of the Communications Sector Coordinating Council Re: “Experience with the Framework for Improving Critical Infrastructure Cybersecurity”

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-23 14:08:46
822Security / Computer security / Information technology governance / Auditing / Risk / COBIT / Information Systems Audit and Control Association / Information security management / Certified Information Security Manager / Data security / Information technology management / Information technology audit

10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:48:57
823Public safety / Electronic commerce / Cybernetics / Systems theory / Computer security / Information security / Multilevel security / Software engineering / System / Security / Crime prevention / National security

PANEL STATEMENT Nontechnical Issues in Achieving Dependably Secure Systems and Networks National Information Systems Security Conference, Crystal City, Virginia, 18-21 October 1999 Chairman: Peter G. Neumann, Computer Sc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
824Public administration / Open government / Data security / Public key infrastructure / Information security / E-Government / Government Paperwork Elimination Act / Public key certificate / Smart card / Cryptography / Key management / Public-key cryptography

Access Certificates for Electronic Services (ACES) - Enabling government to citizen interaction via the Internet Panel Chair: Judith Spencer General Services Administration Federal Technology Service

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
825Microsoft CryptoAPI / Cryptographic Service Provider / PKCS11 / FIPS 140-2 / Security token / CSSM / PKCS / BATON / Application programming interface / Cryptography / Cryptography standards / Cryptographic software

A Comparison of CDSA to Cryptoki Ruth Taylor ([removed]), National Security Agency February 16, 1999 Keywords: CDSA, Cryptoki, CAPI, port Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
826Electronics / Teletraffic / Crime prevention / National security / Computer security / Quality of service / Service-oriented architecture / Information security / Password / Computing / Security / Computer network security

Quality of Security Service* Cynthia Irvine Timothy Levin Naval Postgraduate School

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
827Data security / Crime prevention / National security / Information security / Mandatory access control / Vulnerability / Threat / Security engineering / Access control / Security / Computer security / Cyberwarfare

A Taxonomy of Organisational Security Policies Dr. Gary W. Smith and Richard B. Newton Science Applications International Corporation McLean, VA Abstract: although the Common Criteria provides an exhaustive list of secur

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
828Rockville /  Maryland / Nuclear safety / Safety / Energy / Computer security / Cyber-security regulation / Nuclear energy in the United States / Nuclear technology / Nuclear Regulatory Commission

Nuclear Regulatory Commission Office of Nuclear Security and Incident Response Cyber Security Framework Comments The NRC has completed its review of the framework and provides the below comments in answer to the question

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-09 11:00:03
829Computing / Intrusion detection system / Attack / OSSIM / Intrusion detection system evasion techniques / Computer security / Computer network security / Cyberwarfare

Introduction to Intrusion Detection Thomas R. Peltier, CISSP SM Driving eBusiness Performance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
830Statistics / Fuzzy logic / Artificial intelligence / Logic in computer science / Science / Anomaly detection / Intrusion detection system / Misuse detection / Association rule learning / Logic / Data security / Data mining

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE