Narrow your search

Library

KU Leuven (11)

VDIC (11)


Resource type

book (11)


Language

English (11)


Year
From To Submit

2011 (1)

2010 (1)

2009 (1)

2006 (2)

2005 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Guide to information technology security services
Authors: ---
Year: 2003 Publisher: Gaithersburg, MD : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Guide to computer and network data analysis : applying forensic techniques to incident response : draft
Authors: ---
Year: 2005 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme : recommendations of the National Institute of Standards and Technology
Authors: --- ---
Year: 2002 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security Guide for Interconnecting Information Systems: Recommendations of the National Institute of Standards and Technology
Authors: --- ---
Year: 2002 Publisher: [Place of publication not identified] DIANE Publishing Company

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information resources. The document describes various benefits of interconnecting IT systems, identifies the basic components of an interconnection, identifies methods and levels of interconnectivity, and discusses potential security risks associated with an interconnection. The document then presents a "life-cycle management" approach for interconnecting IT systems, with an emphasis on security. The four phases of the interconnection life cycle are addressed: 1) Planning the interconnection: the participating organizations perform preliminary activities; examine all relevant technical, security, and administrative issues; and form an agreement governing the management, operation, and use of the interconnection. 2) Establishing the interconnection: the organizations develop and execute a plan for establishing the interconnection, including implementing or configuring appropriate security controls. 3) Maintaining the interconnection: the organizations actively maintain the interconnection after it is established to ensure that it operates properly and securely. 4) Disconnecting the interconnection: one or both organizations may choose to terminate the interconnection. The termination should be conducted in a planned manner to avoid disrupting the other party's system. In response to an emergency, however, one or both organizations may decide to terminate the interconnection immediately. The document provides recommended steps for completing each phase, emphasizing security measures that should be taken to protect the connected systems and shared data. The document also contains guides and samples for developing an Interconnection Security Agreement (ISA) and a Memorandum of Understanding/Agreement (MOU/A). The ISA specifies the technical and security requirements of the interconnection, and the MOU/A defines the responsibilities of the participating organizations. Finally, the document contains a guide for developing a System Interconnection Implementation Plan, which defines the process for establishing the interconnection, including scheduling and costs.


Book
Specification for the extensible configuration checklist description format (XCCDF) : version 1.1
Authors: --- --- ---
Year: 2006 Publisher: [Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This document specifies the data model and XML representation for the Extensible Configuration Checklist Description Format (XCCDF). An XCCDF document is a structured collection of security configuration rules for some set of target systems. The XCCDF specification is designed to support information interchange, document generation, organizational and situational tailoring, automated compliance testing, and compliance scoring. The specification also defines a data model and format for storing results of benchmark compliance testing. The intent of XCCDF is to provide a uniform foundation for expression of security checklists, benchmarks, and other configuration guidance, and thereby foster more widespread application of good security practices.


Book
Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
Authors: --- --- ---
Year: 2004 Publisher: [Gaithersburg, Md.] : Washington, DC : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Guide to selecting information technology security products : recommendations of the National Institute of Standards and Technology
Authors: --- --- ---
Year: 2003 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Guide to protecting the confidentiality of Personally Identifiable Information (PII) (draft) : recommendations of the National Institute of Standards and Technology
Authors: --- --- ---
Year: 2009 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The NIST definition of cloud computing
Authors: --- ---
Year: 2011 Publisher: Gaithersburg, MD : Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Guide to protecting the confidentiality of Personally Identifiable Information (PII) : recommendations of the National Institute of Standards and Technology
Authors: --- --- ---
Year: 2010 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 11 << page
of 2
>>
Sort by