Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo
NIST Home > Information Technology Programs and Projects 

Information Technology Programs & Projects

(showing 136 - 150 of 173)
Cryptographic Algorithm Validation Program
Last Updated Date: 01/15/2013

The Cryptographic Algorithm Validation Program (CAVP) encompasses validation testing for FIPS-approved and NIST recommended cryptographic … more

Awareness, Training, Education (ATE) and Professional Development
Last Updated Date: 01/15/2013

This site is an organized set of links to business, college, and university websites that contain information security awareness, training, … more

Program Review for Information Security Management Assistance (PRISMA)
Last Updated Date: 01/15/2013

The Program Review for Information Security Management Assistance (PRISMA) includes many review options and incorporates guidelines contained in … more

Federal Computer Security Program Managers' Forum (Forum)
Last Updated Date: 01/15/2013

The Federal Computer Security Program Managers' Forum is an informal group sponsored by the National Institute of Standards and Technology (NIST) … more

IT System and Network Administration
Last Updated Date: 01/15/2013

The Information Technology (IT) System and Network Administration site represents NIST resources for managing, maintaining, and securing IT … more

Model Driven Security Functional Testing
Last Updated Date: 01/15/2013

Model-Driven Engineering (MDE) is emerging as a promising approach that uses models to support various phases of system development lifecycle such … more

Mobile Security and Forensics
Last Updated Date: 01/15/2013

The goal of the project is to improve the security of mobile devices and software. To that end, we devise and implement, as proof-of-concept … more

Federal Desktop Core Configuration (FDCC)
Last Updated Date: 01/15/2013

The Federal Desktop Core Configuration (FDCC) is an OMB-mandated security configuration. The FDCC currently exists for Microsoft Windows Vista and … more

Security Configuration Checklists for Commercial IT Products
Last Updated Date: 01/15/2013

The solutions to IT security are complex, one basic but effective tool is a security configuration checklist. A security checklist is a document … more

National Checklist Program
Last Updated Date: 01/15/2013

The National Checklist Program (NCP) is the U.S. government repository of publicly available security checklists (or benchmarks) that provide … more

Automated Combinatorial Testing for Software (ACTS)
Last Updated Date: 01/15/2013

Empirical evidence suggests that nearly all software errors are triggered by the interaction of one to six parameters. These results have … more

Structural Databases
Last Updated Date: 10/01/2012

We are witnessing the emergence of a web based "data rich" era on chemical and biological compounds. In order to make significant advances in this … more

Metrics for Manipulation and Enhancements of Forensic Images
Last Updated Date: 06/26/2012

Latent fingerprints are, by definition, left unintentionally and are obtained using diverse physical and chemical techniques. It follows that the … more

High Performance Computing
Last Updated Date: 03/05/2012

High Performance Computing (HPC) enables work on challenging problems that are beyond the capacity and capability of desktop computing resources. … more

NIST High Assurance Domain Project
Last Updated Date: 01/27/2012

The High Assurance Domain (HAD) project was created to foster development and deployment of new network security technologies to increase trust in … more

General Information:
301-975-NIST (6478)

100 Bureau Drive, Stop 1070
Gaithersburg, MD 20899-1070