Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 351 - 372 of 372

Guide for Selecting Automated Risk Analysis Tools

October 1, 1989
Author(s)
Irene E. Gilbert
This document recommends a process for selecting automated risk analysis tools. It is primarily intended for managers and those responsible for managing risks in computer and telecommunications systems. The document describes important considerations for

Management Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes essential components

Computer Viruses and Related Threats: A Management Guide

August 1, 1989
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides guidance for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. The guidance discusses the combined use of policies

Smart Card Technology: New Methods for Computer Access Control

September 1, 1988
Author(s)
Martha E. Haykin, Robert B. Warnar
A smart card is a credit-card-sized device containing one or more integrated circuit chips, which perform the functions of a microprocessor, memory, and an input/output interface. Smart cards, and other related devices, may be used to provide an increased

Accuracy, Integrity, and Security in Computerized Vote-Tallying

August 1, 1988
Author(s)
Roy Saltman
Recommendations are provided to promote accuracy, integrity, and security in computerized vote-tallying, and to improve confidence in the results produced. The recommendations respond to identified problems, and concern software, hardware, operational

Message Authentication Code (MAC) Validation System: Requirements and Procedures

May 1, 1988
Author(s)
Miles E. Smid, Elaine B. Barker, David Balenson, Martha E. Haykin
The National Bureau of Standards Message Authentication Code (MAC) Validation System (MVS) tests message authentication devices for conformance to two data authentication standards: Federal Information Processing Standard Publication (FIPS PUB) 113,

Guide to Auditing for Controls and Security: A System Development Life Cycle Approach

April 1, 1988
Author(s)
Zella G. Ruthberg, Bonnie T. Fisher, William E. Perry, John W. Lainhart, James G. Cox, Mark Gillen, Douglas B. Hunt
This guide addresses auditing the system development life cycle (SDLC) process for an automated information system (AIS), to ensure that controls and security are designed and built into the system. The guide also presents a process for deciding which

Guide on Selecting ADP Backup Processing Alternatives

October 1, 1985
Author(s)
Irene E. Isaac
This publication addresses the issue of selecting ADP backup processing support in advance of events that cause the loss of data processing capability. The document emphasizes the need for managers at all levels of the organization to support the planning

Technology Assessment: Methods for Measuring the Level of Computer Security

October 1, 1985
Author(s)
William Neugent, John Gilligan, Lance Hoffman, Zella G. Ruthberg
This technology assessment constitutes a summary and assessment of methods for measuring the level of computer security in computer applications, systems, and installations. The initial draft report for this document was produced in June 1981 for the

Security of Personal Computer Systems: A Management Guide

January 1, 1985
Author(s)
Dennis D. Steinauer
The use of personal computer systems (often called desktop or professional computers) in the office and home environment has placed increasingly powerful information system technology in the hands of growing numbers of users. While providing many benefits

Executive Guide to ADP Contingency Planning

January 1, 1982
Author(s)
James K. Shaw, Stuart W. Katzke
This document provides, in the form of questions and answers, the background and basic essential information required to understand the developmental process for Automatic Data Processing (ADP) contingency plans. The primary intended audience consists of

A Survey of Remote Monitoring

January 1, 1979
Author(s)
G J. Nutt
This report describes remote monitoring in the application areas of performance evaluation, diagnostic testing, performance assurance and system security testing. The evolution of remote monitoring is briefly reviewed and, then, remote monitors are

Effective Use of Computing Technology in Vote-Tallying

April 1, 1978
Author(s)
Roy Saltman
The results of a systems analysis and evaluation conducted on the role of automatic digital processing in vote-tallying are presented. Included in the report are descriptions of hardware, software, and administrative problems encountered in fourteen

Design Alternatives for Computer Network Security

January 1, 1978
Author(s)
Gerald D. Cole, Dennis K. Branstad
The security problems associated with a network of computers are an extension of those of stand-alone computer systems, but require additional security controls due to the distributed and autonomous nature of the network components. The purpose of this

Performance Assurance and Data Integrity Practices

January 1, 1978
Author(s)
Robert L. Patrick, Robert P. Blanc
This report identifies the approaches and techniques now practiced for detecting, and when possible, correcting malperformance as it occurs in computer information systems. This report is addressed to two audiences: to the systems designer using stock

Audit and Evaluation of Computer Security

October 1, 1977
Author(s)
Zella G. Ruthberg, Robert G. McKenzie
The National Bureau of Standards, with the support of the U.S. General Accounting Office, sponsored an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami Beach, Florida on March 22-24, 1977. Its purpose was to explore the
Displaying 351 - 372 of 372