NIST, RCMP, CSE, CERT & Other Guidance Documents

Vendor: NIST
Date of Publication: March 2012
Tags: FIPS
Summary:

This Standard specifies secure hash algorithms, SHA-1, SHA-224, SHA-256, SHA-384, SHA- 512,...

Vendor: NIST
Date of Publication: February 2012
Summary:

 

Computer security incident response has become an important component of...

Vendor: United States Government Accountability Office
Date of Publication: October 2011
Tags: FISMA
Summary:

What GAO Found

Weaknesses in information security policies and practices at 24 major...

Vendor: NIST
Date of Publication: September 2011
Summary:

The National Institute of Standards and Technology (NIST) announces the initial public draft...

Vendor: NIST
Date of Publication: April 2011
Summary:

Virtualization is a technique for simulating the software and the hardware upon which other...

Vendor: NIST
Date of Publication: August 2011
Summary:

Introduction

An information system is composed of many components4 that can be...

Vendor: PCI Security Standards Council
Date of Publication: August 2011
Summary:

Objective

The purpose of this Information Supplement is to provide guidance for...

Vendor: FFIEC - Federal Financial Institutions Examination Council
Date of Publication: June 2011
Summary:

On October 12, 2005, the FFIEC agencies1 (Agencies) issued guidance entitled Authentication in...

Vendor: Software Engineering Institute, Carnegie Mellon (CERT)
Date of Publication: June 2011
Summary:

A study conducted by the CERT® Program at Carnegie Mellon University’’s Software Engineering...

Vendor: Software Engineering Institute, Carnegie Mellon (CERT)
Date of Publication: February 2011
Tags: CERT
Summary:

This report models the approach a focused attacker would take in order to breach an...

Pages