SP 800-35. Guide to Information Technology Security Services | Semantic Scholar (2024)

Topics

Information Technology (opens in a new tab)Enterprise Architecture (opens in a new tab)Security Policy Development (opens in a new tab)

11 Citations

SP 800-36. Guide to Selecting Information Technology Security Products
    T. GranceM. StevensM. Myers

    Computer Science

  • 2003

This guide defines broad security product categories, specifies product types within those categories, and then provides a list of characteristics and pertinent questions an organization should ask when selecting a product from within these categories.

  • 9
Considerations on the implementation steps for an information security management system
    R. IonescuIoana CeaușuCristian Ilie

    Computer Science, Business

  • 2018

The main objective of this paper is to present an Information Security Management System implementation method in the case of a small company by defining the basic steps in achieving a fully functional Information Security management System.

  • 3
  • PDF
Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision A
    G. StoneburnerC. HaydenAlexis Feringa

    Computer Science, Engineering

  • 2004

The Engineering Principles for Information Technology (IT) Security (HP-ITS) is a list of system-level security principles to be considered in the design, development, and operation of an information system.

  • 113
Security Considerations in the Information System Development Life Cycle
    T. GranceJoan HashM. Stevens

    Computer Science

  • 2003

This change in the terms 'Security Control Integration' and 'System Development Life Cycle' more accurately reflects the effort to integrate the system at the operational site.

  • 9
  • PDF
SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)
    K. StoufferJ. FalcoK. Scarfone

    Engineering, Computer Science

  • 2011

The scope of this document includes ICS that are typically used in the electric, water and wastewater, oil and natural gas, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing industries.

  • 143
SP 800-66 Rev. 1. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
    Matthew SchollKevin M. Stine D. Steinberg

    Law

  • 2008

This publication was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out itn the Security Rule.

  • 96
The Uncontrolled Web: Measuring Security Governance on the Web
    Yuta TakataHiroshi KumagaiMasaki Kamizono

    Computer Science

    IEICE Trans. Inf. Syst.

  • 2021

This paper takes the novel approach of applying the concept of security governance to web-sites and measuring the consistency of software settings and versions used on these websites, and identifies the cause of governance failures and proposes improvement plans.

  • 2
Monitoring and Evaluation of Semantic Rooms
    Paulo Esteves VerssimoLászló Gönczy N. Suri

    Computer Science, Engineering

    Collaborative Financial Infrastructure Protection

  • 2012

This chapter describes an efficient monitoring system that collects vital infrastructure metrics and application data from the set of resources and services used for event processing purposes, and processes those metrics to detect violations of the SR contract.

  • 1
Assessing the security of internet-connected critical infrastructures
    H. GhaniAbdelmajid Khelil J. Clarke

    Computer Science, Engineering

    Secur. Commun. Networks

  • 2014

Because the Internet of Things (IoT) pervasively extends to all facets of life, the “things” are increasingly extending to include the interconnection of the Internet to critical infrastructures

  • 13
  • PDF
Guide to Industrial Control Systems (ICS) Security
    K. StoufferJ. FalcoK. Scarfone

    Engineering, Computer Science

  • 2015

This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other

  • 1,494
  • PDF

...

...

12 References

SP 800-36. Guide to Selecting Information Technology Security Products
    T. GranceM. StevensM. Myers

    Computer Science

  • 2003

This guide defines broad security product categories, specifies product types within those categories, and then provides a list of characteristics and pertinent questions an organization should ask when selecting a product from within these categories.

  • 9
SP 800-23. Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products
    E. Roback

    Computer Science

  • 2000

Two Government programs are of particular interest -- the National Information Assurance Partnership (NIAP)'s Common Criteria Evaluation and Validation Program and NIST's Cryptographic Module Validation program (CMVP).

  • 21
  • PDF
Security metrics guide for information technology systems
    Marianne SwansonNadya BartolJohn SabatoJoan HashLaurie Graffo

    Computer Science, Engineering

  • 2003

This Special Publication 800-series reports on ITL's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations.

  • 245
  • PDF
Building an Information Technology Security Awareness and Training Program
    Mark WilsonJoan Hash

    Computer Science

  • 2003

This guideline has been prepared for use by federal agencies and is consistent with the requirements and may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright.

  • 288
  • PDF
SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model
    Mark WilsonDorothea E. de ZafraSadie I. PitcherJohn D. TresslerJohn B. Ippolito

    Computer Science

  • 1998

This publication presents a new conceptual framework for providing information technology (IT) security training that includes the IT security training requirements appropriate for today's distributed computing environment and provides flexibility for extension to accommodate future technologies and the related risk management decisions.

  • 118
  • PDF
SP 800-33. Underlying Technical Models for Information Technology Security
    G. Stoneburner

    Computer Science

  • 2001

Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to

  • 37
Security Considerations in the Information System Development Life Cycle
    T. GranceJoan HashM. Stevens

    Computer Science

  • 2003

This change in the terms 'Security Control Integration' and 'System Development Life Cycle' more accurately reflects the effort to integrate the system at the operational site.

  • 9
  • PDF
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
    David R. KuhnVincent C. HuW. T. PolkShu-Jen Chang

    Computer Science, Political Science

  • 2001

This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency.

  • 143
  • PDF
Security Requirements for Cryptographic Modules
    W. DaleyC. ShaversRaymond G. Kammer

    Computer Science, Engineering

  • 1999

This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic-based security systems are to be use to provide protection for sensitive or valuable data.

  • 390
Contingency Planning Guide For Information Technology Systems: Recommendations Of The National Institute Of Standards And Technology
    Marianne M. SwansonAmy WohlLucinda PopeT. GranceJoan HashRay Thomas

    Computer Science

  • 2004

Abstract : NIST Special Publication 800-34, Contingency Planning Guide for Information Technology (IT) Systems provides instructions, recommendations, and considerations for government IT contingency

  • 57

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    SP 800-35. Guide to Information Technology Security Services | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Rob Wisoky

    Last Updated:

    Views: 5241

    Rating: 4.8 / 5 (48 voted)

    Reviews: 87% of readers found this page helpful

    Author information

    Name: Rob Wisoky

    Birthday: 1994-09-30

    Address: 5789 Michel Vista, West Domenic, OR 80464-9452

    Phone: +97313824072371

    Job: Education Orchestrator

    Hobby: Lockpicking, Crocheting, Baton twirling, Video gaming, Jogging, Whittling, Model building

    Introduction: My name is Rob Wisoky, I am a smiling, helpful, encouraging, zealous, energetic, faithful, fantastic person who loves writing and wants to share my knowledge and understanding with you.