Information Technology Reference
In-Depth Information
Control 
Reference
Description of 
Applicability a
Category/Document
CP
SP 800-43: Systems Administration 
Guidance for Securing Microsoft 
Windows 2000 Professional System
CP
SP 800-41: Guidelines on Firewalls and 
Firewall Policy
CP
SP 800-34: Contingency Planning Guide 
for Information Technology Systems
CP
SP 800-25: Federal Agency Use of Public 
Key Technology for Digital Signatures 
and Authentication
CP
SP 800-24: PBX Vulnerability Analysis: 
Finding Holes in Your PBX before 
Someone Else Does
CP
SP 800-21, Rev 1: Guideline for 
Implementing Cryptography in the 
Federal Government
CP
SP 800-14: Generally Accepted Principles 
and Practices for Securing Information 
Technology Systems
CP
SP 800-13: Telecommunications Security 
Guidelines for Telecommunications 
Management Network
CP
SP 800-12: An Introduction to Computer 
Security: The NIST Handbook
iA
identification and Authentication
IA
FIPS 201-1: Personal Identity Verification 
for Federal Employees and Contractors
IA
FIPS 200: Security Controls for Federal 
Information Systems
IA
FIPS 190: Guideline for the Use of 
Advanced Authentication Technology 
Alternatives
IA
FIPS 140-2: Security Requirements for 
Cryptographic Modules
 
Search WWH ::




Custom Search