NIST SP800-39.pdf


-
INTRODUCTION THE NEED FOR INTEGRATED ORGANIZATION-WIDE RISK MANAGEMENT nformation technology is widely recognized as the engine that drives the U.S. economy, giving industry a competitive advantage in global markets, enabling the federal government to provide better services to its citizens, and facilitating greater productivity as a nation. Organizations5 in the public and private sectors depend on technology-intensive information systems6 to successfully carry out their missions and business functions. Information systems can include diverse entities ranging from high-end supercomputers, workstations, personal computers, cellular telephones, and personal digital assistants to very specialized systems (e.g., weapons systems, telecommunications systems, industrial/process control systems, and environmental control systems). Information systems are subject to serious threats that can have adverse effects on organizational operations (i.e., missions, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation by exploiting both known and unknown vulnerabilities to compromise the confidentiality, integrity, or availability of the information being processed, stored, or transmitted by those systems. Threats to information and information systems can include purposeful attacks, environmental disruptions, and human/machine errors and result in great harm to the national and economic security interests of the United States. Therefore, it is imperative that leaders and managers at all levels understand their responsibilities and are held accountable for managing information security risk—that is, the risk associated with the operation and use of information systems that support the missions and business functions of their organizations.

1.1MB
NIST SP800-181 NICE 网络空间安全人才框架(NCWF)-中文
2017-05-10NIST SP800-181 网络空间安全人才框架 NCWF,National Initiative for CybersecurityEducation (NICE)中文译本
NIST SP800-39.pdf下载_course
2020-07-11INTRODUCTION THE NEED FOR INTEGRATED ORGANIZATION-WIDE RISK MANAGEMENT nformation technology is wide
465KB
信息安全测试评估技术指南NIST SP 800-115
2018-08-26NIST SP 800-115,这是2008年更新的版本,用于取代老版本NIST SP 800-42,目前尚有一些书籍仍推荐的800-42,略微显得过时
1.85MB
NIST SP800-30信息安全文档
2012-08-04NIST SP800-30-Rev1 for risk assessment
1.33MB
NIST SP800-131Ar1.pdf
2020-02-25At the beginning of the 21st century, the National Institute of Standards and Technology (NIST) bega
738KB
NIST SP800-37.pdf
2020-02-14T • Enabling more consistent, comparable, and repeatable assessments of security controls in federal
232KB
NIST SP800-108.pdf
2020-02-25When parties share a secret symmetric key (e.g., upon a successful execution of a key- establishment
3.72MB
NIST SP800-161.pdf
2020-02-25CHAPTER ONE INTRODUCTION nformation and Communications Technology (ICT) relies on a complex, globall
1.89MB
sp 800-34《信息技术系统应急响应规划指南》
2011-07-09NIST SP800-34《信息技术系统应急响应规划指南》描述了信息系统应急响应计划的基本要素和过程,重点论述了应急响应计划对于不同信息系统类型的特殊考虑和影响,并且通过举例来协助用户制定自己的信息安
568KB
NIST SP 800-193(中文)
2018-12-07这个出版已经由NIST依照法定职责根据联邦信息安全现代化法案》(FISMA) 2014年44事项§3551节。,公法(P.L.) 113-283。NIST负责制定信息安全标准和指南,包括对联邦信息系统
nist sp800-16标准下载_course
2018-07-16nist sp800-16标准,对于信息安全从业人员,培训人员等有参考价值 相关下载链接://download.csdn.net/download/o_xyz/10544233?utm_source=
1.5MB
NIST SP800-38B.pdf
2020-02-14This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key
924KB
NIST SP800-34 rev1 errata.pdf
2020-02-14NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems,
931KB
NIST SP800-64-Revision2.pdf
2020-02-201.1 Purpose and Scope The purpose of this guideline is to assist agencies in building security into
1.71MB
NIST SP800-38C.pdf
2020-02-14This Recommendation specifies an algorithm, Counter with Cipher Block Chaining-Message Authenticatio
1.58MB
NIST SP800-177r1.pdf
2020-02-28NIST SP800-177r1.pdf
7.22MB
NIST SP800-22rev1a.pdf
2020-02-13This paper discusses some aspects of selecting and testing random and pseudorandom number generators
1.13MB
NIST SP800-60 Vol2 Rev1.pdf
2020-02-18Title III of the E-Government Act (Public Law 107-347), titled the Federal Information Security Mana
3.88MB
NIST SP800-121.pdf
2020-02-25The National Institute of Standards and Technology (NIST) developed this document in furtherance of
957KB
NIST SP800-137 Final.pdf
2020-02-25PAGE 1 CHAPTER ONE INTRODUCTION nformation security continuous monitoring (ISCM) is defined as maint
528KB
NIST SP800-53 AppendicesDEF.pdf
2020-02-18MINIMUM SECURITY CONTROLS – SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS
373KB
NIST SP800-135 rev1.pdf
2020-02-25This document specifies security requirements for existing application-specific key derivation funct
806KB
NIST SP800-171.pdf
2020-02-28INTRODUCTION THE NEED TO PROTECT CONTROLLED UNCLASSIFIED INFORMATION oday, more than at any time in
2.84MB
NIST-SP-800-207-ZTA_final_中文版.pdf
2020-08-26零信任 NIST-SP-800-207-ZTA_final_中文版 NIST-SP-800-207-ZTA_final_中文版
1.6MB
NIST SP800-63-2.pdf
2020-02-20This recommendation provides technical guidance to Federal agencies implementing electronic authenti
36KB
NIST SP800-38B Appendix D, Updated CMAC Examples.pdf
2020-02-14The document contains a corrected version of Appendix D of Special Publication 800-38B, which specif
2.73MB
NIST SP800-160v1.pdf
2020-02-25FIPS 201 originally required that all PIV credentials and associated keys be stored in a PIV Card. W
376KB
NIST SP800-133.pdf
2020-02-25Cryptography is often used in an information technology security environment to protect data that is
-
博客
[OSG]大数据截断造成图元闪烁解决方案(占位)
[OSG]大数据截断造成图元闪烁解决方案(占位)
-
学院
xxljob源码分析
xxljob源码分析
-
下载
微信支付rootca.pem通用根证书文件
微信支付rootca.pem通用根证书文件
-
学院
C/C++反汇编解密
C/C++反汇编解密
-
下载
AT24C04.zip
AT24C04.zip
-
学院
C# 高级网络编程及RRQMSocket框架详解
C# 高级网络编程及RRQMSocket框架详解
-
下载
JAVA入门实例2则.rar
JAVA入门实例2则.rar
-
下载
酒店预订源代码.txt
酒店预订源代码.txt
-
博客
三个数排序
三个数排序
-
下载
Linux系统目录结构.docx
Linux系统目录结构.docx
-
博客
Jmeter的使用(一)
Jmeter的使用(一)
-
下载
jacob-1.18.rar
jacob-1.18.rar
-
博客
之前所说的planning其实就是路径规划或者运动规划,避障核心似乎就是靠它,普罗米修斯有专门的planning文件夹
之前所说的planning其实就是路径规划或者运动规划,避障核心似乎就是靠它,普罗米修斯有专门的planning文件夹
-
下载
阿里巴巴java编码规范考试相关.zip
阿里巴巴java编码规范考试相关.zip
-
下载
传感器第一周作业.docx
传感器第一周作业.docx
-
博客
pandas dataframe删除空行或者空列dropna,一般删除指定行或者列drop
pandas dataframe删除空行或者空列dropna,一般删除指定行或者列drop
-
下载
Centos7.6下Oracle开启归档日志和Rman恢复.docx
Centos7.6下Oracle开启归档日志和Rman恢复.docx
-
博客
Kubernetes-Pod/ReplicaSet/Deployment/Service关系
Kubernetes-Pod/ReplicaSet/Deployment/Service关系
-
博客
C++迭代器适配器
C++迭代器适配器
-
学院
CCNA_CCNP 思科网络认证 通过 GNS3 配置 CISCO 思
CCNA_CCNP 思科网络认证 通过 GNS3 配置 CISCO 思
-
学院
《文件和目录操作命令》<Linux核心命令系列Series> <2.>
《文件和目录操作命令》<Linux核心命令系列Series> <2.>
-
博客
DES 加密 解密
DES 加密 解密
-
学院
零基础极简以太坊智能合约开发环境搭建并开发部署
零基础极简以太坊智能合约开发环境搭建并开发部署
-
学院
MySQL 事务和锁
MySQL 事务和锁
-
学院
MySQL DML 语言(插入、更新与删除数据)
MySQL DML 语言(插入、更新与删除数据)
-
下载
abctrain - PHP + MySQL.zip
abctrain - PHP + MySQL.zip
-
学院
Cocos Creator游戏开发-合成大西瓜 CocosCreat
Cocos Creator游戏开发-合成大西瓜 CocosCreat
-
学院
基于SSM实现的房屋租赁系统【附源码】(毕设)
基于SSM实现的房屋租赁系统【附源码】(毕设)
-
博客
紫书UVa511
紫书UVa511
-
学院
计算机网络 静态路由和动态路由协议
计算机网络 静态路由和动态路由协议