Topics
Information Technology (opens in a new tab)Enterprise Architecture (opens in a new tab)Security Policy Development (opens in a new tab)
11 Citations
- T. GranceM. StevensM. Myers
- 2003
Computer Science
This guide defines broad security product categories, specifies product types within those categories, and then provides a list of characteristics and pertinent questions an organization should ask when selecting a product from within these categories.
- 9
- R. IonescuIoana CeaușuCristian Ilie
- 2018
Computer Science, Business
The main objective of this paper is to present an Information Security Management System implementation method in the case of a small company by defining the basic steps in achieving a fully functional Information Security management System.
- 3
- PDF
- G. StoneburnerC. HaydenAlexis Feringa
- 2004
Computer Science, Engineering
The Engineering Principles for Information Technology (IT) Security (HP-ITS) is a list of system-level security principles to be considered in the design, development, and operation of an information system.
- 113
- T. GranceJoan HashM. Stevens
- 2003
Computer Science
This change in the terms 'Security Control Integration' and 'System Development Life Cycle' more accurately reflects the effort to integrate the system at the operational site.
- 9
- PDF
- K. StoufferJ. FalcoK. Scarfone
- 2011
Engineering, Computer Science
The scope of this document includes ICS that are typically used in the electric, water and wastewater, oil and natural gas, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing industries.
- 143
- Matthew SchollKevin M. Stine D. Steinberg
- 2008
Law
This publication was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out itn the Security Rule.
- 96
- Yuta TakataHiroshi KumagaiMasaki Kamizono
- 2021
Computer Science
IEICE Trans. Inf. Syst.
This paper takes the novel approach of applying the concept of security governance to web-sites and measuring the consistency of software settings and versions used on these websites, and identifies the cause of governance failures and proposes improvement plans.
- 2
- Paulo Esteves VerssimoLászló Gönczy N. Suri
- 2012
Computer Science, Engineering
Collaborative Financial Infrastructure Protection
This chapter describes an efficient monitoring system that collects vital infrastructure metrics and application data from the set of resources and services used for event processing purposes, and processes those metrics to detect violations of the SR contract.
- 1
- H. GhaniAbdelmajid Khelil J. Clarke
- 2014
Computer Science, Engineering
Secur. Commun. Networks
Because the Internet of Things (IoT) pervasively extends to all facets of life, the “things” are increasingly extending to include the interconnection of the Internet to critical infrastructures…
- 13
- PDF
- K. StoufferJ. FalcoK. Scarfone
- 2015
Engineering, Computer Science
This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other…
- 1,494
- PDF
...
...
12 References
- T. GranceM. StevensM. Myers
- 2003
Computer Science
This guide defines broad security product categories, specifies product types within those categories, and then provides a list of characteristics and pertinent questions an organization should ask when selecting a product from within these categories.
- 9
- E. Roback
- 2000
Computer Science
Two Government programs are of particular interest -- the National Information Assurance Partnership (NIAP)'s Common Criteria Evaluation and Validation Program and NIST's Cryptographic Module Validation program (CMVP).
- 21
- PDF
- Marianne SwansonNadya BartolJohn SabatoJoan HashLaurie Graffo
- 2003
Computer Science, Engineering
This Special Publication 800-series reports on ITL's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations.
- 245
- PDF
- Mark WilsonJoan Hash
- 2003
Computer Science
This guideline has been prepared for use by federal agencies and is consistent with the requirements and may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright.
- 288
- PDF
- Mark WilsonDorothea E. de ZafraSadie I. PitcherJohn D. TresslerJohn B. Ippolito
- 1998
Computer Science
This publication presents a new conceptual framework for providing information technology (IT) security training that includes the IT security training requirements appropriate for today's distributed computing environment and provides flexibility for extension to accommodate future technologies and the related risk management decisions.
- 118
- PDF
- G. Stoneburner
- 2001
Computer Science
Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to…
- 37
- T. GranceJoan HashM. Stevens
- 2003
Computer Science
This change in the terms 'Security Control Integration' and 'System Development Life Cycle' more accurately reflects the effort to integrate the system at the operational site.
- 9
- PDF
- David R. KuhnVincent C. HuW. T. PolkShu-Jen Chang
- 2001
Computer Science, Political Science
This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency.…
- 143
- PDF
- W. DaleyC. ShaversRaymond G. Kammer
- 1999
Computer Science, Engineering
This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic-based security systems are to be use to provide protection for sensitive or valuable data.
- 390
- Marianne M. SwansonAmy WohlLucinda PopeT. GranceJoan HashRay Thomas
- 2004
Computer Science
Abstract : NIST Special Publication 800-34, Contingency Planning Guide for Information Technology (IT) Systems provides instructions, recommendations, and considerations for government IT contingency…
- 57
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers