ITL

Results: 829



#Item
721Public safety / Crime prevention / National security / Information security / National Institute of Standards and Technology / Security risk / Vulnerability / Security / Computer security / Data security

ITL Bulletin, Small and Medium-Size Business Information Security Outreach Program, (May 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-13 07:07:06
722Malware / Antivirus software / Threat / Vulnerability / Attack / Cyberwarfare / Computer security / Computer network security

ITL Bulletin, ITL Publishes Guidance On Preventing And Handling Malware Incidents, September 2013

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-08-23 13:16:31
723Public safety / Computer network security / National security / Security controls / Information security / NIST Special Publication 800-53 / Privacy / Security / Data security / Computer security

ITL Bulletin - ITL Publishes Security And Privacy Controls For Federal Agencies, May 2013

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-01 08:15:01
724Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
725Computer network security / Risk / CVSS / Vulnerability / Social vulnerability / Common Weakness Enumeration / Common Vulnerabilities and Exposures / National Vulnerability Database / Cross-site scripting / Computer security / Cyberwarfare / Security

ITL Bulletin, Release of NIST Interagency Report 7946, CVSS Implementation Guidance (July 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 10:49:21
726Patch / Software maintenance / Transdermal patch / Vulnerability / IT risk management / System software / Computing / Computer security

ITL Bulletin, ITL Publishes Guidance on Enterprise Patch Management Technologies, August 2013

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-08-23 13:18:48
727Key / FIPS 140-2 / Symmetric-key algorithm / Message authentication code / Digital Signature Algorithm / Block cipher / Data Encryption Standard / Digital signature / Cryptographic key types / Cryptography / Key management / Public-key cryptography

ITL BULLETIN FOR DECEMBER 2012 GENERATING SECURE CRYPTOGRAPHIC KEYS: A CRITICAL COMPONENT OF CRYPTOGRAPHIC KEY MANAGEMENT AND THE PROTECTION OF SENSITIVE INFORMATION Shirley Radack, Editor Computer Security Division Info

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 13:52:53
728Security / Cloud computing / Security controls / Information security management system / Security risk / Information security / Vulnerability / Privacy / NIST Special Publication 800-53 / Computer security / Computing / Data security

ITL Bulletin March 2012, Guidelines for Improving Security and Privacy in Public Cloud Computing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:25:17
729Reference / Statistics / Federal Information Processing Standard / National Institute of Standards and Technology / FIPS / Credential / Standards / FIPS 201 / Evaluation

ITL Updates Federal Information Processing Standard (FIPS) for Personal Identity Verification (PIV) of Federal Employees and Contractors

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-10-21 15:41:49
730Security Content Automation Protocol / National Vulnerability Database / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Extensible Configuration Checklist Description Format / Social vulnerability / United States Computer Emergency Readiness Team / Information security / Computer security / Security / Cyberwarfare

ITL BULLETIN FOR DECEMBER 2013 THE NATIONAL VULNERABILITY DATABASE (NVD): OVERVIEW Harold Booth, Doug Rike and Greg Witte, Editors Computer Security Division Information Technology Laboratory National Institute of Standa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-17 16:45:44
UPDATE