下载  >  安全技术  >  其它  > NIST SP800-39.pdf

NIST SP800-39.pdf 评分

INTRODUCTION THE NEED FOR INTEGRATED ORGANIZATION-WIDE RISK MANAGEMENT nformation technology is widely recognized as the engine that drives the U.S. economy, giving industry a competitive advantage in global markets, enabling the federal government to provide better services to its citizens, and

...展开详情
所需积分/C币:6 上传时间:2020-02-14 资源大小:1.16MB
举报 举报 收藏 收藏
分享 分享
NIST SP800-53A rev1.pdf

INTRODUCTION THE NEED TO ASSESS SECURITY CONTROL EFFECTIVENESS IN INFORMATION SYSTEMS T T oday’s information systems9 are complex assemblages of technology (i.e., hardware, software, and firmware), processes, and people, working together to provide organizations with the capability to process, s

立即下载
NIST SP800-55.pdf

The requirement to measure information technology (IT) security performance is driven by regulatory, financial, and organizational reasons. A number of existing laws, rules, and regulations cite IT performance measurement in general, and IT security performance measurement in particular, as a req

立即下载
NIST SP800-161.pdf

CHAPTER ONE INTRODUCTION nformation and Communications Technology (ICT) relies on a complex, globally distributed, and interconnected supply chain ecosystem that is long, has geographically diverse routes, and consists of multiple tiers of outsourcing. This ecosystem is composed of public and priv

立即下载
NIST.SP.800-82r2 Guide to Industrial Control Systems (ICS) Security.pdf

This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) are oft

立即下载
NIST SP800-107.pdf

A hash algorithm is used to map a message of arbitrary length to a fixed-length message digest. Federal Information Processing Standard (FIPS) 180-3, the Secure Hash Standard (SHS) [FIPS 180-3], specifies five approved hash algorithms: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. Secure hash algor

立即下载
NIST SP800-38Gr1-draft.pdf

This Recommendation specifies two methods, called FF1 and FF3-1, for format-preserving 108 encryption. Both of these methods are modes of operation for an underlying, approved symmetric109 key block cipher algorithm. Compared to the original version of this publication, the tweak size 110 for FF3

立即下载
NIST SP800-85A-1.pdf

The objective of this document is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components—PIV middleware and PIV card application with the specifications in NIST SP 800-73-2. Because NIST SP 800-73-2 specifications were develop

立即下载
NIST SP800-128.pdf

with minimally acceptable system configuration requirements, as determined by the agency” within their information security program.5 Managing system configurations is also a minimum security requirement identified in FIPS 200,6 and NIST SP 800-537 defines security controls that support this require

立即下载
NIST SP800-85A-2-final.pdf

The objective of this document is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components—PIV Middleware and PIV Card Applications with the specifications in NIST SP 800-73-3. Because NIST SP 800-73-3 specifications were develo

立即下载
NIST SP800-153.pdf

The purpose of this publication is to provide organizations with recommendations for improving the security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified

立即下载
NIST SP800-94.pdf

This publication seeks to assist organizations in understanding intrusion detection system (IDS) and intrusion prevention system (IPS) technologies and in designing, implementing, configuring, securing, monitoring, and maintaining intrusion detection and prevention systems (IDPS). It provides practi

立即下载
NIST SP800-78-4.pdf

FIPS 201-2 defines requirements for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201-2 also defines the structure of an identity credential that includes cryptographic keys. This document contains the technical specifications nee

立即下载
NIST sp800-27.pdf

The purpose of the Engineering Principles for Information Technology (IT) Security (EP-ITS) is to present a list of system-level security principles to be considered in the design, development, and operation of an information system. Ideally, the principles presented here would be used from the

立即下载
NIST SP800-123.pdf

The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. Hosts that incidentally provide one or a few services for ma

立即下载
NIST SP800-36.pdf

furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations

立即下载
NIST SP800-40.pdf

The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimu

立即下载
NIST SP800-178.pdf

The purpose of this document is to compare and contrast Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) — two very different access control standards with similar goals and objectives. The document explains the basics of both standards and provides a compa

立即下载
NIST SP800-170.pdf

Overview: CTG’s work in the field of cryptography includes researching, analyzing, and standardizing cryptographic technology, such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random number generation. CTG’s goal is to identify and

立即下载
NIST SP800-106.pdf

This document has been developed by the National Institute of Standards and Technology (NIST) in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, inclu

立即下载
html+css+js制作的一个动态的新年贺卡

该代码是http://blog.csdn.net/qq_29656961/article/details/78155792博客里面的代码,代码里面有要用到的图片资源和音乐资源。

立即下载