생몰정보
소속
직위
직업
활동분야
주기
서지
국회도서관 서비스 이용에 대한 안내를 해드립니다.
검색결과 (전체 1건)
원문 있는 자료 (1) 열기
원문 아이콘이 없는 경우 국회도서관 방문 시 책자로 이용 가능
목차보기더보기
Title page
Contents
ACKNOWLEDGMENTS 4
DISCLAIMER 4
WELCOME LETTER 6
THE INFORMATION TECHNOLOGY LABORATORY IMPLEMENTS THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT 10
INFORMATION TECHNOLOGY LABORATORY (ITL) CYBERSECURITY PROGRAM IMPLEMENTS FEDERAL INFORMATION SECURITY MANAGEMENT ACT 11
ITL CYBERSECURITY PROGRAM AND PROJECTS 17
ITL INVOLVEMENT WITH INTERNATIONAL IT SECURITY STANDARDS 18
RISK MANAGEMENT 24
BIOMETRIC STANDARDS AND ASSOCIATED CONFORMITY ASSESSMENT TESTING TOOLS 34
CYBERSECURITY APPLICATIONS 35
SOFTWARE ASSURANCE & QUALITY 38
FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT (R&D) 41
COMPUTER FORENSICS 41
CYBERSECURITY AWARENESS, TRAINING, EDUCATION, AND OUTREACH 43
CRYPTOGRAPHIC STANDARDS PROGRAM 50
VALIDATION PROGRAMS 66
IDENTITY AND ACCESS MANAGEMENT 79
RESEARCH IN EMERGING TECHNOLOGIES 88
NATIONAL CYBERSECURITY CENTER OF EXCELLENCE 101
INTERNET INFRASTRUCTURE PROTECTION 104
ADVANCED SECURITY TESTING AND MEASUREMENTS 107
TECHNICAL SECURITY METRICS 118
USABILITY AND SECURITY 122
HONORS AND AWARDS 124
ITL CYBERSECURITY PROGRAM PUBLICATIONS RELEASED IN FY 2017 128
ITL CYBERSECURITY PROGRAM RELATED PUBLICATIONS 134
APPENDIX A: ACRONYMS 167
APPENDIX B: NIST CYBERSECURITY EVENTS HELD DURING FY 2017 175
APPENDIX C: OPPORTUNITIES TO ENGAGE WITH THE ITL CYBERSECURITY PROGRAM DURING FY 2018 180
Table 1. Impact of quantum computing on common cryptographic algorithms 62
Table 2. Cryptographic algorithms & NIST technical documents (FIPS & SPs) 75
Table 3. Scap 1.2 Specifications 110
Table 4/Table 5. Special publications (SPs) 129
Table 5/Table 6. NIST internal or interagency reports (NISTIRs) 130
Table 6/Table 7. Final SPs 131
Table 7/Table 8. Final NISTIRs 132
Table 8/Table 9. FY 2017 ITL bulletins 132
Table 9/Table 10. Other FY 2017 publications 133
Figure 1. SDOs involved in Cybersecurity 18
Figure 2. Cryptographic Module Testing-ISO Standards 20
Figure 3. PEP guidance roadmap for integrating privacy risk management into NIST SPs, featuring integrations underway during FY 2017 (highlighted in green) 29
Figure 4. C-SCRM Disciplines 31
Figure 5. C-SCRM Aspects 31
Figure 6. Criticality Analysis Process Overview 32
Figure 7. BioCTS AN MRT Testing Multiple Standards Within Single Test 34
Figure 8. Collaborative robotics portion of the ICS cybersecurity testbed 37
Figure 9. Graph of Size, Type, and Languages Of Test Cases in SARD 39
Figure 10. Causal Graph for Bufer Overfow 40
Figure 11. The Seven Categories of the NICE Framework 43
Figure 12. Clarence Williams, Lead for Government Engagement at NICE, and Rodney Petersen, Director of NICE, speak with an attendee at the CyberSecureGov Conference in Washington, D.C. 43
Figure 13. Entropy Source Model 52
Figure 14. XOR-NRBG 53
Figure 15. DRBG and Oversampling NRBG 53
Figure 16. High-level Architecture of EaaS 56
Figure 17. Key-Agreement Example 58
Figure 18. Inversion in GF (2⁴) 63
Figure 19. Example of a Blockchain 65
Figure 20. CAVP Validation Status by Fiscal Year 67
Figure 21. CAVP Validation Status for FY 2017 68
Figure 22. Validated Implementation Actual Numbers 68
Figure 23. FY 2017 CMVP Certifcates by Security Level 70
Figure 24. Current Validation Flow 72
Figure 25. Updated CMVP Structure Leveraging Automation 73
Figure 26. SCAP 1.2 Validation Process 78
Figure 27. Government Employees Use PIV Cards for Facility Access 81
Figure 28. Access Control and Privilege Management 82
Figure 29. Access Control Policy Tool (ACPT) 84
Figure 30. Access Control Rule Implementation 84
Figure 31. ABAC Access Control Mechanism Chart 86
Figure 32. Container Technology Stack 95
Figure 33. Draft Authentication Concept Map 98
Figure 34. Draft Authentication Taxonomy 98
Figure 35. Suitability Framework for Authentication 99
Figure 36. The Enhancing Resilience of the Internet and Communications Ecosystem Workshop 103
Figure 37. Measurement of global networks with most BGP announcements protected by RPKI 105
Figure 38. NIST BGPsec prototypes and test tools 106
Figure 39. SWID Tags Support the Software Product Lifecycle 111
Figure 40. Confguration Categories 117
Figure 41. Distribution of failures at t = 1..6 120
Figure 42. Layers of Abstraction within a Mobile Computing Device 121
원문구축 및 2018년 이후 자료는 524호에서 직접 열람하십시요.
도서위치안내: / 서가번호:
우편복사 목록담기를 완료하였습니다.
* 표시는 필수사항 입니다.
* 주의: 국회도서관 이용자 모두에게 공유서재로 서비스 됩니다.
저장 되었습니다.
로그인을 하시려면 아이디와 비밀번호를 입력해주세요. 모바일 간편 열람증으로 입실한 경우 회원가입을 해야합니다.
공용 PC이므로 한번 더 로그인 해 주시기 바랍니다.
아이디 또는 비밀번호를 확인해주세요