Information Security Automation Program

Results: 36



#Item
11Computing / Domain name system / Network architecture / DNSSEC / Domain Name System Security Extensions / Federal Information Security Management Act / Network security / Security Content Automation Protocol / Internet protocols / Internet / Computer security

Cyber and Network Security Program Scott Rose, NIST [removed] FOSE 2011 July 20, 2011

Add to Reading List

Source URL: www.dnsops.gov

Language: English - Date: 2012-04-11 14:41:39
12Federal Information Security Management Act / Security Content Automation Protocol / National Institute of Standards and Technology / FIPS 140-2 / Institute for Information Infrastructure Protection / Security controls / Information Security Automation Program / Information security / Domain Name System Security Extensions / Computer security / Security / Computing

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 10:59:19
13Cyberwarfare / Crime prevention / Software testing / Hacking / Vulnerability / Security guard / Information security / Security / Computer security / Data security

Security Assessment Tool Security Assessment Tool The Child Support Program has recently made tremendous strides. In the early 90’s the program was in the planning stages and had some automation. In the late 90’s

Add to Reading List

Source URL: www.acf.hhs.gov

Language: English - Date: 2012-09-13 17:12:39
14National security / Cyberwarfare / Computer law / Federal Information Security Management Act / Information Security Automation Program / Information security management system / Information security / Vulnerability / NIST Special Publication 800-53 / Computer security / Security / Data security

WELCOME The Computer Security Division (CSD), a component of NIST’s Information Technology Laboratory (ITL), provides standards and technology to protect information systems against threats to the confidentiality, inte

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-20 00:00:00
15Software testing / Vulnerability / Attack / National Strategy to Secure Cyberspace / Information Security Automation Program / Computer security / Cyberwarfare / Hacking

TACIT Security Institutionalizing Cyber Protection for Critical Assets Joint Federal Cyber Summit December 4, 2013 Dr. Ron Ross

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-30 13:43:02
16National Vulnerability Database / Vulnerability / Automation / Asset / Security Content Automation Protocol / Information Security Automation Program / Computer security / Security / Cyberwarfare

  ITL SECURITY AUTOMATION PROGRAM   NIST, in coordination with the National Security Agency, Department of Defense, Department of Homeland Security, and industry partners, has developed technical specifications for sh

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-19 15:38:00
17EMASS / Department of Defense Information Technology Security Certification and Accreditation Process / Knowledge / Quality assurance / DOD Information Assurance Certification and Accreditation Program / System Security Authorization Agreement / Accreditation / Security controls / Mission assurance / Computer security / Department of Defense Information Assurance Certification and Accreditation Process / United States Department of Defense

DoD Information Assurance (IA) Certification & Accreditation (C&A) Process (DIACAP) for 2nd Annual NIST, NSA, DISA Security Automation Conference and Workshop

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
18Computing / Extensible Configuration Checklist Description Format / Security / Federal Information Security Management Act / Validation / National Voluntary Laboratory Accreditation Program / Information Security Automation Program / Computer security / Security Content Automation Protocol / Management

NISTIR 7511 Revision 3 Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-07-25 10:17:33
19Computing / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / Validation / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology / Information security / FIPS 140-3 / FIPS 140-2 / Computer security / Security / Security Content Automation Protocol

DRAFT NISTIR 7511 Revision 3.04, Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 11:21:03
UPDATE