Computer Security Institute

Results: 1676



#Item
631Security / Hacking / National security / Attack / Vulnerability / Security management / Threat / SCADA / Institute for Information Infrastructure Protection / Computer security / Cyberwarfare / Computer network security

Executive Summary iv Primer

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-11 14:38:18
632Computing / Federal Desktop Core Configuration / Federal Information Security Management Act / Validation / Vulnerability / Computer security / Cyberwarfare / Security Content Automation Protocol

Security Content Automation Protocol (SCAP) Validation and the Federal Desktop Core Configuration (FDCC) Peter Mell, SCAP Validation Program Manager National Institute of Standards and Technology

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
633Cyber-security regulation / Government / National Cable & Telecommunications Association / Computer security / United States Department of Homeland Security / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Public safety

Before the National Institute of Standards and Technology DEPARTMENT OF COMMERCE

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
634Business / Security / Government / Gaithersburg /  Maryland / National Institute of Standards and Technology / Advisory Committee on Earthquake Hazards Reduction / Malcolm Baldrige National Quality Award / America COMPETES Act / FIPS 201 / Computer security / United States Department of Commerce / Standards organizations

[removed]Federal Register / Vol. 77, No[removed]Monday, July 9, [removed]Notices CONTACT—Continued New York USEAC,

Add to Reading List

Source URL: www.nehrp.gov

Language: English - Date: 2012-07-10 12:09:41
635Security / Electronic warfare / Military science / Hacking / War / Naval Postgraduate School / Cyberspace / Computer security / Air Force Institute of Technology / Cyberwarfare / Staff colleges / Computer network security

ONE BREACH IS ONE TOO MANY IN CYBER WARFARE - MontereyHerald.com : ONE BREACH IS ONE TOO MANY IN CYBER WARFARE exercise is meant to give students who volunteer a

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2008-04-29 08:57:18
636Computer network security / Computer security / Crime prevention / National security / Secure communication / United States Department of Homeland Security / Government / National Cyber Security Division / Security / Public safety / Cyberwarfare

Response to National Institute of Standards and Technology’s Request for Information “Experience with the Framework for Improving Critical Infrastructure Cybersecurity”

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
637Computer network security / Computing / National security / Security controls / Information security management system / Federal Information Security Management Act / Cyber security standards / Computer security / Security / Data security

Tutorial Developing Security Plans for Information Technology Systems Instructor: Marianne Swanson, National Institute of Standards and Technology The objective of system security planning is to improve protection of inf

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
638Data / Secure communication / Internet protocols / Computer network security / HTTP / HTTP Secure / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Computing / Cryptography

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
639Computer network security / Network topology / Hacking / Software testing / Vulnerability / Topology / Computer network / Node / Optical fiber / Electronics / Electronic engineering / Cyberwarfare

Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks 1 T. H. Shake‚, B. HazzardÁ, D. Marquis‚ ‚Distributed Systems Group, ÁAdvanced Networks Group Lincoln Laboratory, Massachusetts Institute of

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE