Information Technology Reference
In-Depth Information
Control 
Reference
Description of 
Applicability a
Category/Document
PE
SP 800-100: Information Security 
Handbook for Managers
PE
SP 800-96: PIV Card/Reader 
Interoperability Guidelines
PE
SP 800-92: Guide to Computer Security 
Log Management
PE
SP 800-86: Guide to Integrating Forensic 
Techniques into Incident Response
PE
SP 800-78: Cryptographic Algorithms and 
Key Sizes for Personal Identity 
Veriication
PE
SP 800-76: Biometric Data Specification 
for Personal Identity Verification
PE
SP 800-73, Rev 1: Integrated Circuit Card 
for Personal Identification Verification
PE
SP 800-66: An Introductory Resource 
Guide for Implementing the Health 
Insurance Portability and Accountability 
Act (HIPAA) Security Rule
PE
SP 800-58: Security Considerations for 
Voice Over IP Systems
PE
SP 800-24: PBX Vulnerability Analysis: 
Finding Holes in Your PBX before 
Someone Else Does
PE
SP 800-14: Generally Accepted Principles 
and Practices for Securing Information 
Technology Systems
PE
SP 800-12: An Introduction to Computer 
Security: The NIST Handbook
pl
planning
PL
FIPS 199: Standards for Security 
Categorization of Federal Information 
and Information Systems
 
Search WWH ::




Custom Search