相关下载链接://download.csdn.net/download/o_xyz/10544233?utm_source=bbsseo
等级:
nist sp800-16标准,对于信息安全从业人员,培训人员等有参考价值
工业控制系统信息安全标准NIST SP800系列 英文原版,另附对应的中文标准
CHAPTER ONE INTRODUCTION nformation and Communications Technology (ICT) relies on a complex, globally distributed, and interconnected supply chain ecosystem that is long, has geographically diverse ...
NIST SP800-181 网络空间安全人才框架 NCWF,National Initiative for CybersecurityEducation (NICE)中文译本
When parties share a secret symmetric key (e.g., upon a successful execution of a key- establishment scheme as specified in [1] and [2]), it is often the case that additional keys will be needed (e.g....
This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide ...
T • Enabling more consistent, comparable, and repeatable assessments of security controls in federal information systems; • Promoting a better understanding of agency-related mission risks ...
NIST随机性检测文档NIST SP800-22r1a,A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications。 1 检测项对比 NIST和国密随机性检测项目的对比如下: NIST.
At the beginning of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance. This included lessons learned over ...
NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems, provides instructions, recommendations, and considerations for federal information system ...
1.1 Purpose and Scope The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate ...
NIST SP800-30-Rev1 for risk assessment
Title III of the E-Government Act (Public Law 107-347), titled the Federal Information Security Management Act (FISMA), tasked the National Institute of Standards and Technology (NIST) to develop: ...
美国国家标准与技术研究院NIST-SP800-82_《工业控制系统安全指南》
3 NIST SP 800-53A, as amended, defines security control effectiveness as “the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with ...
This document specifies security requirements for existing application-specific key derivation functions in: American National Standard (ANS) X9.42-2001-Public Key Cryptography for the Financial ...
This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the ...
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002...
This recommendation provides technical guidance to Federal agencies implementing electronic authentication. The recommendation covers remote authentication of users over open networks....
MINIMUM SECURITY CONTROLS – SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS he following table lists the minimum security controls, or ...http://csrc.nist.gov/sec-cert.
INTRODUCTION THE NEED TO PROTECT CONTROLLED UNCLASSIFIED INFORMATION oday, more than at any time in history, the federal government is relying on external service providers to help carry out a wide ...
nist 发布的云计算安全标准
NIST 零信任架构SP 800-207 标准草案 第二版 中文版 云安全联盟大中华区SDP工作组翻译稿
INTRODUCTION THE NEED FOR INTEGRATED ORGANIZATION-WIDE RISK MANAGEMENT nformation technology is widely recognized as the engine that drives the U.S.... giving industry a competitive advantage in global...
NIST SP800系列标准 SP800是美国NIST(National Institute of Standards and Technology)发布的一系列关于信息安全的指南(SP是Special Publications的缩写)。文档很多,也很细,值得大家学习。 在NIST的...
This Recommendation specifies an algorithm, Counter with Cipher Block Chaining-Message Authentication Code [1], abbreviated CCM, that can provide assurance of the confidentiality and authenticity of ...
NIST SP800-26 NIST SP800-26
零信任 NIST-SP-800-207-ZTA_final_中文版 NIST-SP-800-207-ZTA_final_中文版
FIPS 201 originally required that all PIV credentials and associated keys be stored in a PIV Card. While the use of the PIV Card for electronic authentication works well with traditional desktop and ...
<div><p>This commit implements the KDFs defined in NIST SP800-56c and 108. The KDF API in Botan has not way to set the context and label parameters so they're both hard coded to the empty string. ...