CSRC

Results: 4036



#Item
861Cyberwarfare / Information security / Risk management framework / Security controls / Vulnerability / Risk management / National Institute of Standards and Technology / IT risk management / Federal Information Security Management Act / Computer security / Security / Data security

Ongoing Authorization Transitioning to Near Real-Time Risk Management August 19, 2014 Kelley Dempsey

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-20 13:05:08
862Technology / Engineering / Test automation / Evaluation / Software testing / Automation / Manual testing

Continuous Diagnostics and Mitigation (CDM) Overview Training

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-16 11:48:57
863Gaithersburg /  Maryland / National Institute of Standards and Technology / Calibration / Joint Quantum Institute / Certified reference materials / Metrology / Measurement / Standards

The Computer Security Division Measurement Science for IT IT for Measurement Science

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-20 12:56:57
864Risk / Software testing / Computer network security / Vulnerability / Social vulnerability / Threat / Risk assessment / Information Technology Security Assessment / Cyberwarfare / Computer security / Security

Type of Submission: Paper Title or Topic: The Network Vulnerability Tool (NVT) – A System Vulnerability Visualization Architecture

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
865National security / Public safety / Computer law / Federal Information Security Management Act / Information assurance / Information security / Computer security / Security / Crime prevention

U.S. Department of State Bureau of Diplomatic Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-20 13:00:11
866Security token / Electronic authentication / Authentication / Software token / Credential / Identity management / Security / Computer security

An Overview of Draft SP[removed]Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-25 12:31:45
867Cyberwarfare / National security / Crime prevention / Data security / Information security / Threat / Vulnerability / Attack / Critical infrastructure protection / Computer security / Security / Computer network security

Corporate Vital Defense Strategy: A framework for Information Assurance Bel G. Raggad, Ph.D. School of Computer Science and Information Systems Pleasantville, NY[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
868Computing / Brocade Communications Systems / 10 Gigabit Ethernet / FIPS 140-2 / Stackable switch / FIPS 140 / ICx / Network switch / Ethernet / Cryptography standards / Networking hardware

brocade_security_policy_fcx_icx_sx_fi80-8(cm) (brocade_13.10.29_v1.0)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-13 08:19:16
869

Preparing for Intrusion Detection Presentation Abstract Systems and networks are subject to attacks both internally and externally. The increasingly frequent attacks on Internet-visible systems could be attempts to steal

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2000-11-03 00:00:00
    870Zeroisation / Cryptographic Module Validation Program / Advanced Encryption Standard / Disk encryption / Cryptography / Cryptography standards / FIPS 140

    TID[removed]5CM2-Kanguru_So[removed]V1_140sp

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-11-13 06:50:18
    UPDATE