home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-06-10 | 93.4 KB | 1,655 lines |
-
- BIBLIOGRAPHY OF GUIDELINES
-
- (1974 through 1988
-
- Note: A bibliography is now being developed to encompass 1989.
-
-
- AUTHORS SPECIFIED
-
- ABUSE/MISUSE/CRIME
-
-
- AUTHOR: Ruder, Brian and Madden, J.D.
-
- TITLE: An Analysis of Computer Security Safeguards
- for Detecting and Preventing Intentional
- Computer Misuse
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-25
- PUBLICATION DATE: January 1978
- CATEGORY: Abuse/Misuse/Crime
- COST: $11.95
- DESCRIPTION: Analyzes 88 computer safeguard
- techniques that could be applied to recorded, actual
- computer misuse cases.
-
-
- ACCESS CONTROL
-
-
- AUTHOR: Brand, Sheila L. and Makey, Jeffrey D.
-
- TITLE: Department of Defense Password Management
- Guidelines
-
- ORGANIZATION: Department of Defense Computer
- Security Center
- PUBLISHER/ORIGINATOR: Department of Defense Computer
- Security Center
- REPORT NO: CSC-STD-002-85
- PUBLICATION DATE: April 12, 1985
- CATEGORY: Access Control
- COST: $1.75
- DESCRIPTION: This guideline is also known as the
- Green Book. This document provides a set of good
- practices related to the use of password-based user
- authentication mechanisms in automatic data
- processing systems.
-
-
- AUTHOR: Branstad, Dennis
-
- TITLE: Computer Security and the Data Encryption
- Standard
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-27
- PUBLICATION DATE: February 1978
- CATEGORY: Access Control
- COST: $16.95
- DESCRIPTION: Includes papers and summaries of
- presentations made at a 1978 conference on computer
- security.
-
-
-
- AUTHOR: Branstad, Dennis
-
- TITLE: Standard on Password Usage
-
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 112
- PUBLICATION DATE: March 1985
- CATEGORY: Access Control
- COST: $13.95
- DESCRIPTION: Discusses ten minimum security criteria
- to consider when designing a password-based access
- control system for a computer.
-
-
-
- AUTHOR: Cole, Gerald and Heinrich, Frank
-
- TITLE: Design Alternatives for Computer Network
- Security (Vol.I) The Network Security Center: A
- System Level Approach to Computer Network Security
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-21
- PUBLICATION DATE: January 1978
- CATEGORY: Access Control
- COST: $10.00
- DESCRIPTION: This study focuses on the data
- encryption standard and looks at the network
- security requirements and implementation of a
- computer dedicated to network security.
-
- AUTHOR: Gait, Jason
-
- TITLE: Maintenance Testing for the Data
- Encryption Standard
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-61
- PUBLICATION DATE: August 1980
- CATEGORY: Access Control
- COST: $9.95
- DESCRIPTION: Describes the SRI hierarchical
- development methodology for designing large software
- systems such as operating systems and data
- management systems that meet high security
- requirements.
-
-
- AUTHOR: Gait, Jason
-
- TITLE: Validating the Correctness of Hardware
- Implementations of the NBS Data Encryption
- Standard
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-20
- PUBLICATION DATE: November 1977
- CATEGORY: Access Control
- COST: $9.95
- DESCRIPTION: Describes the design and operation of
- the ICST testbed that is used for the validation of
- hardware implementations of (DES).
-
-
- AUTHOR: Orceyre, M.J. and Courtney, R.H. Jr.
-
- TITLE: Considerations in the Selection of
- Security Measures of Automatic Data
- Processing Systems
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-33
- PUBLICATION DATE: No Date Given
- CATEGORY: Access Control
- COST: $8.50
- DESCRIPTION: This publication list techniques that
- can be used for protecting computer data transmitted
- across telecommunications lines.
-
-
- AUTHOR: Smid, Miles E.
-
- TITLE: A Key Notarization System for Computer
- Networks
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-54
- PUBLICATION DATE: October 1979
- CATEGORY: Access Control
- COST: $4.50
- DESCRIPTION: Looks at a system for key
- notarization that can be used with an encryption
- device which will improve data security in a
- computer network.
-
-
- AUTHOR: Troy, Eugene F.
-
- TITLE: Security for Dial-Up Lines
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-137
- PUBLICATION DATE: May 1986
- CATEGORY: Access Control
- COST: $3.75
- DESCRIPTION: Methods for protecting computer systems
- against intruders using dial-up telephone lines are
- discussed.
-
-
- AUTHOR: Wood, Helen
-
- TITLE: The Use of Passwords for Controlled
- Access to Computer Resources
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-9
- PUBLICATION DATE: May 1977
- CATEGORY: Access Control
- COST: $11.95
- DESCRIPTION: Describes the need for and uses of
- passwords. Password schemes are categorized
- according to selection technique, lifetime,
- physical characteristics, and information content.
-
-
- AUDIT AND EVALUATION
-
-
-
- AUTHOR: Brand, Sheila L.
-
- TITLE: Department of Defense Trusted Computer
- System Evaluation Criteria
-
- ORGANIZATION: Department of Defense
-
- PUBLISHER/ORIGINATOR: Department of Defense Computer
- Security Center
- REPORT NO: CSC-STD-001-83
- PUBLICATION DATE: August 15, 1983
- CATEGORY: Audit and Evaluation
- COST: Free
- DESCRIPTION: This document forms the basic
- requirements and evaluation classes needed for
- assessing the effectiveness of security and controls
- used by automatic data processing (ADP) systems.
-
-
- AUTHOR: Dallas, Dennis A. & Vallabhaneni, Rao S.
-
- TITLE: Auditing Program Libraries for Change
- Controls
-
- ORGANIZATION: Institute of Internal Auditors
-
- PUBLISHER/ORIGINATOR: Institute of Internal Auditors
-
- REPORT NO: 693
- PUBLICATION DATE: 1986
- CATEGORY: Audit and Evaluation
- COST: $12.00
- DESCRIPTION: This monograph is a concise how-to
- guide for reviewing program libraries and associated
- computer program change controls that are risky and
- prone to human error.
-
-
- AUTHOR: Ruthberg, Zella and McKenzie,
- Robert, ed.
- TITLE: Audit and Evaluation of Computer Security
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-19
- PUBLICATION DATE: October 1978
- CATEGORY: Audit and Evaluation
- COST: $7.50
- DESCRIPTION: An examination of the recommendations
- by computer auditing experts on how to improve
- computer security audit practices.
-
-
- AUTHOR: Ruthberg, Zella, ed.
-
- TITLE: Audit and Evaluation of Computer Security
- II: System Vulnerabilities and Control
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-57
- PUBLICATION DATE: April 1980
- CATEGORY: Audit and Evaluation
- COST: $7.00
- DESCRIPTION: Proceedings of the second NIST/GAO
- workshop to develop improved computer security audit
- procedures.
-
- AUTHOR: Ruthberg, Zella, Fisher, Bonnie,
- Perry, William, Lainhart, John, Cox, James,
- Gillen, Mark, Hunt, Douglas
- TITLE: Guide to Auditing for Controls and Security:
- A System Development Life Cycle Approach
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC 500-153
- PUBLICATION DATE: April 1988
- CATEGORY: Auditing & Evaluation
- COST: $25.95
- DESCRIPTION: This guide addresses auditing the
- system development life cycle process for an
- automated information system, to ensure that
- controls and security are designed and built into
- the system.
-
-
- AUTHOR: Ruthberg, Zella & Fisher, Bonnie
-
- TITLE: Work Priority Scheme for EDP Audit and
- Computer Security Review
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBSIR 86-3386
- PUBLICATION DATE: August 1986
- CATEGORY: Audit and Evaluation
- COST: $11.95
- DESCRIPTION: Describes a methodology for
- prioritizing the work performed by EDP auditors and
- computer security reviewers.
-
-
- CERTIFICATION
-
-
- AUTHOR: Giragosian, P.A., Mastbrook, D.W. &
- Tompkins, F.G.
- TITLE: Guidelines for Certification of Existing
- Sensitive Systems
-
- ORGANIZATION: Mitre Corporation
-
- PUBLISHER/ORIGINATOR: National Aeronautics and
- Space Administration
- REPORT NO: PB84-223122
- PUBLICATION DATE: July 1982
- CATEGORY: Certification
- COST: $11.95
- DESCRIPTION: This document describes a way to
- perform evaluations of the security of a computer
- system that has sensitive software applications.
-
-
- AUTHOR: Ruthberg, Zella G. & Neugent, William
-
- TITLE: Overview of Computer Security Certification
- and Accreditation
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-109
- PUBLICATION DATE: April 1984
- CATEGORY: Certification
- COST: $1.50
- DESCRIPTION: These guidelines describe the major
- features of the certification and accreditation
- process. It is intended to help ADP managers and
- their staff understand this process.
-
-
- CONTINGENCY PLANNING
-
-
- AUTHOR: Isaac, Irene
-
- TITLE: Guide on Selecting ADP Backup Process
- Alternatives
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- of Standards and Technology
- REPORT NO: NBS SPEC PUB 500-134
- PUBLICATION DATE: November 1985
- CATEGORY: Contingency Planning
- COST: $1.75
- DESCRIPTION: Discusses the selection of ADP backup
- processing support in advance of events that cause
- the loss of data processing capability.
-
-
- AUTHOR: Schabeck, Tim A.
-
- TITLE: Emergency Planning Guide for Data
- Processing Centers
-
- ORGANIZATION: None Specified
-
- PUBLISHER/ORIGINATOR: Assets Protection
-
- REPORT NO: ISBN No. 0-933708-00-9
- PUBLICATION DATE: 1979
- CATEGORY: Contingency Planning
- COST: $10.00
- DESCRIPTION: This checklist provides an audit tool
- to evaluate a data processing center's current
- disaster defense mechanisms and recovery capability.
-
-
- AUTHOR: Shaw, James K. and Katzke, Stuart
-
- TITLE: Executive Guide to ADP Contingency
- Planning
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-85
- PUBLICATION DATE: July 1981
- CATEGORY: Contingency Planning
- COST: $7.00
- DESCRIPTION: This document discusses the background
- needed to understand the developmental process for
- Automatic Data Processing contingency plans.
-
-
- DATA BASE SECURITY
-
-
- AUTHOR: Patrick, Robert L.
-
- TITLE: Performance Assurance and Data Integrity
- Practices
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-24
- PUBLICATION DATE: January 1978
- CATEGORY: Data Base Security
- COST: $10.00
- DESCRIPTION: Describes methods that have been
- successful in preventing computer failure caused by
- programming and data errors.
-
-
- GENERAL SECURITY
-
- AUTHOR: Fletcher, J.G.
-
- TITLE: Security Policy for Distributed Systems
-
-
- ORGANIZATION: Lawrence Livermore National
- Laboratory
- PUBLISHER/ORIGINATOR: National Technical
- Information Service
- REPORT NO: DE82-022517
- PUBLICATION DATE: April 6, 1982
- CATEGORY: General Security
- COST: $9.95
- DESCRIPTION: This document provides a security
- policy for distributed systems. It has been modeled
- according to security procedures for non-computer
- items.
-
-
- AUTHOR: Moore, Gwendolyn B., Kuhns, John L.,
- Treffs, Jeffrey, & Montgomery, Christine
- TITLE: Accessing Individual Records from Personal
- Data Files Using Non-unique Identifiers
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-2
- PUBLICATION DATE: February 1977
- CATEGORY: General Security
- COST: $11.95
- DESCRIPTION: Analyzes methodologies for retrieving
- personal information using non-unique identifiers
- such as name, address, etc. This study presents
- statistical data for judging the accuracy and
- efficiency of various methods.
-
-
- AUTHOR: Smid, Miles
-
- TITLE: Standard on Computer Data Authentication
-
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 113
- PUBLICATION DATE: March 1985
- CATEGORY: General Security
- COST: $9.95
- DESCRIPTION: This publication describes a data
- authentication algorithm that can detect
- unauthorized modification to computer data
- either intentionally or accidentally.
-
-
-
- AUTHOR: Tompkins, F.G.
-
- TITLE: NASA Guidelines for Assuring the Adequacy
- and Appropriateness of Security Safeguards
- in Sensitive Applications
- ORGANIZATION: Mitre Corporation
-
- PUBLISHER/ORIGINATOR: National Aeronautics and
- Space Administration
- REPORT NO: PB85-149003/XAB
- PUBLICATION DATE: September 1984
- CATEGORY: General Security
- COST: $18.95
- DESCRIPTION: This document discusses security
- measures that should be taken in order to help
- conform with Office of Management and Budget
- Circular A-71.
-
-
- AUTHOR: Westin, Allen F.
-
- TITLE: Computers, Personnel Administration, and
- Citizen Rights
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-50
- PUBLICATION DATE: July 1979
- CATEGORY: General Security
- COST: $34.95
- DESCRIPTION: Reports on impact of computers on
- citizen rights in the field of personnel record
- keeping.
-
-
- MICROCOMPUTER SECURITY
-
- AUTHOR: Steinauer, Dennis D.
-
- TITLE: Security of Personal Computer Systems: A
- Management Guide
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-120
- PUBLICATION DATE: No Date Given
- CATEGORY: Microcomputer Security
- COST: $3.00
- DESCRIPTION: This publication provides practical
- advice on the issues of physical and environmental
- protection system and data access control, integrity
- of software and data, backup and contingency
- planning, auditability, and communications
- protection.
-
-
- PRIVACY
-
- AUTHOR: Fong, Elizabeth
-
- TITLE: A Data Base Management Approach to Privacy
- Act Compliance
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-10
- PUBLICATION DATE: June 1977
- CATEGORY: Privacy
- COST: $4.50
- DESCRIPTION: Looks at commercially available data
- base management systems that can be used in meeting
- Privacy Act requirements for the handling of
- personal data.
-
-
- AUTHOR: Goldstein, Robert, Seward, Henry, &
- Nolan, Richard
- TITLE: A Methodology for Evaluating Alternative
- Technical and Information Management
- Approaches to Privacy Requirements
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: PB 254048
- PUBLICATION DATE: June 1976
- CATEGORY: Privacy
- COST: $11.50
- DESCRIPTION: Describes the methods to be used by
- recordkeepers to comply with the Privacy Act. A
- computer model is included to help determine the
- most cost-effective safeguards.
-
-
-
- RISK MANAGEMENT
-
- AUTHOR: Courtney, Robert H. Jr.
-
- TITLE: Guideline for Automatic Data Processing
- Risk Analysis
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 65
- PUBLICATION DATE: August 1979
- CATEGORY: Risk Management
- COST: $8.50
- DESCRIPTION: Shows how to use a technique that
- provides a way of conducting risk analysis of an ADP
- facility. It gives an example of the risk analysis
- process.
-
-
- AUTHOR: Jacobson, Robert V., Brown, William F.,
- & Browne, Peter S.
- TITLE: Guidelines for ADP Physical Security and
- Risk Management
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 31
- PUBLICATION DATE: June 1974
- CATEGORY: Risk Management
- COST: $11.95
- DESCRIPTION: Provides guidance to federal
- organizations in developing physical security and
- risk management programs for their ADP facilities.
-
-
- AUTHOR: Neugent, William, Gilligan, John,
- Hoffman, Lance & Ruthberg, Zella G.
- TITLE: Technology Assessment: Methods for
- Measuring the Level of Computer Security
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-133
- PUBLICATION DATE: October 1985
- CATEGORY: Risk Management
- COST: $8.00
- DESCRIPTION: This document covers methods for
- measuring the level of computer security and
- addresses individual techniques and approaches, as
- well as broader methodologies.
-
-
- AUTHOR: Tompkins, F.G.
-
- TITLE: Guidelines for Contingency Planning NASA
- ADP Security Risk Reduction Decision
- Studies
- ORGANIZATION: Mitre Corporation
-
- PUBLISHER/ORIGINATOR: National Aeronautic and
- Space Administration
- REPORT NO: PB84-189836
- PUBLICATION DATE: January 1984
- CATEGORY: Risk Management
- COST: $13.95
- DESCRIPTION: How to determine an acceptable level
- of ADP security risks is described as well as the
- role of risk management in problem solving and
- information systems analysis and design.
-
-
- AUTHOR: Tompkins, F.G
-
- TITLE: Guidelines for Developing NASA ADP Security
- Risk Management Plans
-
- ORGANIZATION: Mitre Corporation
-
- PUBLISHER/ORIGINATOR: National Aeronautics and
- Space Administration
- REPORT NO: PB84-171321
- PUBLICATION DATE: August 1983
- CATEGORY: Risk Management
- COST: $13.95
- DESCRIPTION: This report looks at how NASA develops
- ADP security risk management plan. Risk management
- processes have six components and each are
- identified and discussed.
-
-
- SECURITY MANAGEMENT
-
- AUTHOR: Rosenthal, Lynne S.
-
- TITLE: Guidance on Planning and Implementing
- Computer Systems Reliability
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-121
- PUBLICATION DATE: January 1985
- CATEGORY: Security Management
- COST: $2.25
- DESCRIPTION: The basic concepts of computer system
- security are given to provide managers and planners
- with background for improving computer system
- reliability.
-
-
-
-
- SOFTWARE & OPERATING SYSTEM SECURITY
-
-
-
- AUTHOR: Levitt, Karl, Neumann, Peter, and
- Robinson, Lawrence
- TITLE: The SRI Hierarchical Development
- Methodology (HDM) and its Application to
- the Development of Secure Software
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: NBS SPEC PUB 500-67
- PUBLICATION DATE: October 1980
- CATEGORY: Software and Operating System Security
- COST: $4.25
- DESCRIPTION: Shows how to design large software
- systems, such as an operating system, that will
- meet the hardest security requirements.
-
-
- TRAINING & AWARENESS
-
-
- AUTHOR: Davis, Bevette
-
- TITLE: Computer Security Bibliography
-
-
- ORGANIZATION: Mitre Corporation
-
- PUBLISHER/ORIGINATOR: Mitre Corporation
-
- REPORT NO: MTR 9654
- PUBLICATION DATE: April 1985
- CATEGORY: Training & Awareness
- COST:
- DESCRIPTION: Identifies organizations and
- individuals that have published documents, magazine
- and journal articles, conference proceedings, and
- reports concerning computer security.
-
-
- AUTHOR: Tompkins, Frederick G.
-
- TITLE: Guidelines for Development of NASA Computer
- Security Training Programs
-
- ORGANIZATION: Mitre Corporation
-
- PUBLISHER/ORIGINATOR: National Aeronautics and
- Space Administration
- REPORT NO: PB84-171339/LP
- PUBLICATION DATE: May 1983
- CATEGORY: Training & Awareness
- COST: $11.95 plus $3.00 shipping & handling
- DESCRIPTION: This report identifies computer
- security training courses and is intended to be used
- by NASA in developing training requirements and
- implementing computer security training programs.
-
-
- AUTHORS NOT SPECIFIED
-
- AUTHOR: N/A
-
- TITLE: Computer Fraud and Abuse Act of 1986
-
- ORGANIZATION:
-
- PUBLISHER/ORIGINATOR:
-
- REPORT NO: Public Law 99-474
- PUBLICATION DATE: October 16, 1986
- CATEGORY: Abuse/Misuse/Crime
- COST: Free
- DESCRIPTION: Provides additional penalties for
- fraud and related activities in connection with
- access devices and computers.
-
-
- AUTHOR: N/A
-
- TITLE: Federal Manager's Financial Integrity
- Act of 1982
-
- ORGANIZATION:
-
- PUBLISHER/ORIGINATOR:
-
- REPORT NO: Public Law 97-255
- PUBLICATION DATE: September 8, 1982
- CATEGORY: Abuse/Misuse/Crime
- COST: Free
- DESCRIPTION: This law amends the accounting and
- auditing act of 1950 to require ongoing evaluations
- and reports on the adequacy of the systems of
- internal accounting and administrative control of
- each executive agency, and for other purposes.
-
-
-
-
- ACCESS CONTROL
-
-
- AUTHOR: Not Specified
-
- TITLE: Data Encryption Standard
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 46
- PUBLICATION DATE: January 1977
- CATEGORY: Access Control
- COST: $7.00
- DESCRIPTION: Discusses an algorithm to be used for
- the cryptographic protection of sensitive, but
- unclassified, computer data. Tells how to transform
- data into a cryptographic cipher and back again.
-
-
- AUTHOR: Not Specified
-
- TITLE: DES Modes of Operation
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 81
- PUBLICATION DATE: December 1980
- CATEGORY: Access Control
- COST: $8.50
- DESCRIPTION: This publication discusses the four
- modes of operation used by the Data Encryption
- Standard.
-
-
-
- AUTHOR: N/A
-
- TITLE: Electronic Communications Privacy Act of
- 1986
-
- ORGANIZATION:
-
- PUBLISHER/ORIGINATOR:
-
- REPORT NO: Public Law 99-508
- PUBLICATION DATE: October 21, 1986
- CATEGORY: Access Control
- COST: Free
- DESCRIPTION: Amends title 18, United States Code,
- with respect to the interception of certain
- communications, and other forms of surveillance, and
- for other purposes.
-
-
- AUTHOR: Not Specified
-
- TITLE: Guidelines on Evaluation of Techniques for
- Automated Personnel Identification
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 48
- PUBLICATION DATE: April 1977
- CATEGORY: Access Control
- COST: $7.00
- DESCRIPTION: The performance and evaluation of
- personal identification devices is explained.
- Considerations for their use in a computer system
- is given.
-
-
-
- AUTHOR: Not Specified
-
- TITLE: Guidelines for Implementing and Using the
- NBS Data Encryption Standard
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 74
- PUBLICATION DATE: April 1981
- CATEGORY: Access Control
- COST: $8.50
- DESCRIPTION: Discusses the guidelines that federal
- organizations should use when cryptographic
- protection is required for sensitive or valuable
- computer data.
-
-
- AUTHOR: Not Specified
-
- TITLE: Guideline on User Authentication Techniques
- for Computer Network Access Control
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 83
- PUBLICATION DATE: September 1980
- CATEGORY: Access Control
- COST: $8.50
- DESCRIPTION: Details the use of passwords,
- identification tokens, and other means to protect
- against unauthorized access to computers and
- computer networks.
-
-
- AUTHOR: Not Specified
-
- TITLE: Information Security: Products and Services
- Catalogue
-
- ORGANIZATION: National Computer Security Center
-
- PUBLISHER/ORIGINATOR: National Computer Security
- Center
- REPORT NO: None Specified
- PUBLICATION DATE: Published Quarterly
- CATEGORY: Access Control
- COST: Free
- DESCRIPTION: This catalogue contains the endorsed
- cryptographic products list, NSA endorsed data
- encryption standard products list, protected
- services list, evaluated products list, and
- preferred products list.
-
-
- AUTHOR: Not Specified
-
- TITLE: National Policy on Controlled Access
- Protection
-
- ORGANIZATION: National Telecommunications and
- Information Systems Security
- PUBLISHER/ORIGINATOR: NTISSC
- Ft. George G. Meade, MD
- REPORT NO: NTISSP No. 200
- PUBLICATION DATE: July 15, 1987
- CATEGORY: Access Control
- COST: Free
- DESCRIPTION: Defines a minimum level of protection
- for automated information systems operated by
- executive branch agencies and departments of the
- federal government and their contractors.
-
-
-
- AUTHOR: Not Specified
-
- TITLE: Standard on Computer Data Authentication
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 113
- PUBLICATION DATE: May 1985
- CATEGORY: Access Control
- COST: $9.95
- DESCRIPTION: Specifies a data authentication
- algorithm which, when applied to computer data,
- automatically and accurately detects unauthorized
- modifications, both intentional and accidental.
-
-
- AUTHOR: Not Specified
-
- TITLE: Standard on Password Usage
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 112
- PUBLICATION DATE: May 1985
- CATEGORY: Access Control
- COST: $13.95
- DESCRIPTION: Discusses ten minimum security
- criteria to consider when designing a password-based
- access control system for a computer.
-
-
- AUTHOR: Not Specified
-
- TITLE: Trusted Network Interpretation of the
- Trusted Computer System Evaluation
- Criteria
- ORGANIZATION: National Computer Security Center
-
- PUBLISHER/ORIGINATOR: National Computer Security
- Center
- REPORT NO: NCSC-TG-005
- PUBLICATION DATE: July 31, 1987
- CATEGORY: Access Control
- COST:
- DESCRIPTION: This is also known as the Red Book.
- This guidelines examines interpretations to extend
- the evaluation classes of the Trusted Systems
- Evaluation Criteria to trusted network systems and
- components.
-
- AUDIT AND EVALUATION
-
-
- AUTHOR: Not Specified
-
- TITLE: Assessing Reliability of Computer Output -
- Audit Guide
-
- ORGANIZATION: U.S. General Accounting Office
-
- PUBLISHER/ORIGINATOR: U.S. General Accounting Office
-
- REPORT NO: AFMD-81-91
- PUBLICATION DATE: June 1981
- CATEGORY: Audit and Evaluation
- COST: Free (if less than 5 ordered)
- DESCRIPTION: This audit guide shows how to comply
- with GAO policy requirements by giving detailed
- procedures to help determine the degree of risk
- using information that could be incorrect.
-
-
- AUTHOR: Not Specified
-
- TITLE: Computer Security Requirements: Guidance for
- Applying the Dod Trusted Computer System
- Evaluation Criteria in Specific Environments
- ORGANIZATION: Department of Defense Computer
- Security Center
- PUBLISHER/ORIGINATOR: Department of Defense
- Computer Security Center
- REPORT NO: CSC-STD-003-85
- PUBLICATION DATE: June 25, 1985
- CATEGORY: Audit and Evaluation
- COST: $1.00
- DESCRIPTION: These reports show how to use DOD
- 5200.28-STD in specific environments.
-
-
- AUTHOR: Not Specified
-
- TITLE: Evaluating Internal Controls in Computer-
- Based Systems - Audit Guide
-
- ORGANIZATION: U.S. General Accounting Office
-
- PUBLISHER/ORIGINATOR: U.S. General Accounting Office
-
- REPORT NO: AFMD-81-76
- PUBLICATION DATE: June 1981
- CATEGORY: Audit and Evaluation
- COST: Free (if less than 5 are ordered).
- DESCRIPTION: Describes an approach for evaluating a
- computer-based system that will enable an auditor to
- evaluate the entire system from original to output.
-
-
- AUTHOR: Not Specified
-
- TITLE: Technical Rationale Behind CSC-STD-003-85
- Computer Security Requirements: Guidance for
- Applying the DoD Trusted Computer System Evaluation
- Criteria in Specific Environments
- ORGANIZATION: Department of Defense Computer
- Security Center
- PUBLISHER/ORIGINATOR: Department of Defense
- Computer Security Center
- REPORT NO: CSC-STD-004-85
- PUBLICATION DATE: June 25, 1985
- CATEGORY: Audit and Evaluation
- COST: $2.00
- DESCRIPTION: Give guidance to applying the DOD
- CSC-STD-003-85.
-
-
-
- CERTIFICATION
-
-
- AUTHOR: Not Specified
-
- TITLE: Guideline for Computer Security
- Certification and Accreditation
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 102
- PUBLICATION DATE: September 1983
- CATEGORY: Certification
- COST: $11.50
- DESCRIPTION: Describes ways of establishing and
- carrying out a computer security certification and
- accreditation program.
-
-
- CONTINGENCY PLANNING
-
-
-
- AUTHOR: Not Specified
-
- TITLE: Guidelines for ADP Contingency Planning
-
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 87
- PUBLICATION DATE: March 1981
- CATEGORY: Contingency Planning
- COST: $8.50
- DESCRIPTION: Describes data processing
- management considerations for developing a
- contingency plan for an ADP facility.
-
-
- DATA BASE SECURITY
-
- AUTHOR: Not Specified
-
- TITLE: Guideline on Integrity Assurance and
- and Control in Database Applications
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 88
- PUBLICATION DATE: August 1981
- CATEGORY: Data Base Security
- COST: $11.50
- DESCRIPTION: Gives detailed advice on how to achieve
- data base integrity and security control. A step-by-
- step procedure for examining and verifying the
- the accuracy and completeness of a data base is
- included.
-
-
- ENVIRONMENTAL SECURITY
-
-
- AUTHOR: Not Specified
-
- TITLE: Guideline on Electrical Power for ADP
- Installations
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 94
- PUBLICATION DATE: September 1982
- CATEGORY: Environmental Security
- COST: $13.00
- DESCRIPTION: This publication discusses electrical
- power factors that can affect the operation of an
- ADP system.
-
-
-
- GENERAL SECURITY
-
-
- AUTHOR: N/A
-
- TITLE: Computer Security Act of 1987
-
-
- ORGANIZATION:
-
- PUBLISHER/ORIGINATOR:
-
- REPORT NO: Public Law 100-235
- PUBLICATION DATE: January 8, 1988
- CATEGORY: General Security
- COST: Free
- DESCRIPTION: To provide for a computer standards
- program within the National Institute of Standards
- and Technology, to provide Government-wide computer
- security, and to provide for the training in secur-
- ity matters of persons who are involved in the
- management, operation, and use of Federal computer
- systems.
-
-
- AUTHOR: Not Specified
-
- TITLE: Glossary for Computer Systems Security
-
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 39
- PUBLICATION DATE: February 1974
- CATEGORY: General Security
- COST: $9.95
- DESCRIPTION: A reference document containing
- approximately 170 terms and definitions pertaining
- to privacy and computer security.
-
-
- AUTHOR: Not Specified
-
- TITLE: Guidelines for Security of Computer
- Applications
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 73
- PUBLICATION DATE: June 1980
- CATEGORY: General Security
- COST: $10.00
- DESCRIPTION: These guidelines are to be used in the
- development and operation of computer systems that
- require protection. Data validation, user
- authentication, and encryption are discussed.
-
-
-
- AUTHOR: Not Specified
-
- TITLE: NBS Publication List 91: Computer Security
- Publications
-
- ORGANIZATION: Institute for Computer Sciences and
- Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: 003-003-00135-0
- PUBLICATION DATE: August 1984
- CATEGORY: General Security
- COST: $18.00
- DESCRIPTION: Provides information on computer
- security publications that are available.
-
-
- AUTHOR: Not Specified
-
- TITLE: Sensitive Unclassified Computer Security
- Program Compliance Review Guidelines
-
- ORGANIZATION: U.S. Department of Energy
-
- PUBLISHER/ORIGINATOR: U.S. Department of Energy
-
- REPORT NO: DOE/MA-0188/1
- PUBLICATION DATE: September 1985
- CATEGORY: General Security
- COST:
- DESCRIPTION: This guideline contains questionaires
- for determining the level of security needed at a
- computer installation. Techniques for obtaining the
- required level of security are discussed.
-
-
-
- MICROCOMPUTER SECURITY
-
-
- AUTHOR: Not Specified
-
- TITLE: Computer Security- User Handbook for
- Microcomputers and Word Processors
-
- ORGANIZATION: U.S. Department of Energy
-
- PUBLISHER/ORIGINATOR: U.S. Department of Energy
-
- REPORT NO: None Specified
- PUBLICATION DATE: September 1986
- CATEGORY: Microcomputer Security
- COST:
- DESCRIPTION: This guideline gives a synopsis on
- computer security requirements for users of
- microcomputers and/or word processors.
-
-
- AUTHOR: Not Specified
-
- TITLE: Personal Computer Security Considerations
-
-
- ORGANIZATION: National Computer Security Center
-
- PUBLISHER/ORIGINATOR: National Computer Security
- Center
- REPORT NO: NCSC-WA-002-85
- PUBLICATION DATE: December 1985
- CATEGORY: Microcomputer Security
- COST: Free
- DESCRIPTION: This publication provides a general
- discussion of a number of issues that are pertinent
- to microcomputer security in the home and business
- environment.
-
-
- AUTHOR: Not Specified
-
- TITLE: Security Guide for Users of Personal
- Computers and Word Processors
-
- ORGANIZATION: Pacific Northwest Laboratory
-
- PUBLISHER/ORIGINATOR: Pacific Northwest Laboratory
-
- REPORT NO: None Specified
- PUBLICATION DATE: June 1986
- CATEGORY: Microcomputer Security
- COST: Free (for single copies).
- DESCRIPTION: Contains instructions on a variety of
- computer security techniques including protective
- storage and handling, passwords, emergency
- procedures, and other related security subjects.
-
-
- AUTHOR: Not Specified
-
- TITLE: Security Guidelines for Microcomputers
- and Word Processors
-
- ORGANIZATION: U.S. Department of Energy
-
- PUBLISHER/ORIGINATOR: U.S. Department of Energy
- ATTN: Information Services
- P.O. Box 62
- Oakridge, TN 37831
- REPORT NO: DOE/MA-0181
- PUBLICATION DATE: March 1985
- CATEGORY: Microcomputer Security
- COST: $9.45
- DESCRIPTION: These guidelines are concerned with the
- training of in the protection of computers
- (hardcopy, storage media, etc.). Communications
- security, emergency procedures, and the prevention
- of system misuse are also discussed.
-
-
-
- PRIVACY
-
-
- AUTHOR: Not Specified
-
- TITLE: Computer Security Guidelines for
- implementing the Privacy Act of 1974
-
- ORGANIZATION: Institute for Computer Sciences
- and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO: FIPS PUB 41
- PUBLICATION DATE: May 1975
- CATEGORY: Privacy
- COST: $7.00
- DESCRIPTION: This document shows how to protect
- personal data in automated information systems.
- Discusses how to improve system security using
- safeguards and controls.
-
-
- RISK MANAGEMENT
-
-
- AUTHOR: N/A
-
- TITLE: Internal Control Systems
-
-
- ORGANIZATION: Office Of Management and Budget
-
- PUBLISHER/ORIGINATOR: Office of Management & Budget
-
- REPORT NO: OMB Circular A-123
- PUBLICATION DATE: August 4, 1986
- CATEGORY: Risk Management
- COST: Free
- DESCRIPTION: This circular prescribes policies and
- procedures to be followed by executive departments
- and agencies in establishing, maintaining,
- evaluating, improving, and reporting on internal
- controls in their program and administrative
- activitiies.
-
-
- AUTHOR: Not Specified
-
- TITLE: NASA ADP Risk Analysis Guideline
-
- ORGANIZATION: National Aeronautics and Space
- Administration
- PUBLISHER/ORIGINATOR: National Aeronautics and
- Space Administration
- REPORT NO: None Specified
- PUBLICATION DATE: July 1984
- CATEGORY: Risk Management
- COST: Free
- DESCRIPTION: This document describes guidelines for
- the ADP risk analysis methodology to be used at
- NASA ADP facilities and provides guidance for
- performing an ADP risk analysis without specialized
- contractor assistance.
-
-
-
- SECURITY MANAGEMENT
-
- AUTHOR: Not Specified
-
- TITLE: Computers: Crimes, Clues, and Controls. A
- Management Guide
-
- ORGANIZATION: President's Council on Integrity and
- Efficiency
- PUBLISHER/ORIGINATOR: National Technical
- Information Service
- REPORT NO: PB86-221850/XAB
- PUBLICATION DATE: March 1986
- CATEGORY: Security Management
- COST: $13.95
- DESCRIPTION: This publication, which is meant for
- managers, deals with information security, physical
- security, personnel security, and a plan of action.
- Listed are ways to detect and prevent abuse of
- computers.
-
-
- AUTHOR: N/A
-
- TITLE: Guidance for Preparation and Submission of
- Security Plans for Federal Computer Systems
- Containing Sensitive Information
- ORGANIZATION: Office of Management & Budget
-
- PUBLISHER/ORIGINATOR: Office of Management & Budget
-
- REPORT NO: OMB Bulletin 88-16
- PUBLICATION DATE: July 6, 1988
- CATEGORY: Security Management
- COST: Free
- DESCRIPTION: Guidance for preparation and submission
- of security plans for federal computer systems
- containing sensitive information.
-
-
-
- AUTHOR: N/A
-
- TITLE: Management of Federal Information Resources
-
-
- ORGANIZATION: Office of Management and Budget
-
- PUBLISHER/ORIGINATOR: Office of Management and
- Budget
- REPORT NO: OMB Circular No. A-130
- PUBLICATION DATE: December 12, 1985
- CATEGORY: Security Management
- COST: Free
- DESCRIPTION: A general policy framework for the
- management of federal information resources is given
- in this circular.
-
-
- AUTHOR: N/A
-
- TITLE: National Policy on Telecommunications and
- Automated Information Systems Security
-
- ORGANIZATION: National Security Council
-
- PUBLISHER/ORIGINATOR:
-
- REPORT NO: National Security Decision Directive 145
- PUBLICATION DATE: September 17, 1984
- CATEGORY: Security Management
- COST: Free
- DESCRIPTION: This directive establishes a senior
- steering group, an interagency group at the
- operating level, an executive agent and a national
- manager to implement national policy on
- telecommunications and automated information systems
- security.
-
-
- TRAINING & AWARENESS
-
- AUTHOR: Not Specified
-
- TITLE: Computer Security Awareness and Training
- (Bibliography)
-
- ORGANIZATION: Martin Marietta Energy Systems, Inc.
-
- PUBLISHER/ORIGINATOR: U.S. Department of Energy
-
- REPORT NO: DOE/MA-320 Volume 1
- PUBLICATION DATE: February 1988
- CATEGORY: Training and Awareness
- COST: $11.65
- DESCRIPTION: This bibliography contains materials
- and information that are available concerning
- unclassified computer security.
-
-
- AUTHOR: N/A
-
- TITLE: Computer Security Training Guidelines
- (Draft)
-
- ORGANIZATION: National Institute of
- Standards and Technology
- PUBLISHER/ORIGINATOR: National Institute of
- Standards and Technology
- REPORT NO:
- PUBLICATION DATE: July 8, 1988
- CATEGORY: Training & Awareness
- COST:
- DESCRIPTION: These guidelines are intended to
- assist agencies to meet the training requirements
- of the computer security act of 1987.
-
-
- AUTHOR: Not Specified
-
- TITLE: Computer Security Awareness and Training
- (Guideline)
-
- ORGANIZATION: Martin Marietta Energy Systems, Inc.
-
- PUBLISHER/ORIGINATOR: U.S. Department of Energy
-
- REPORT NO: DOE/MA-0320 Volume 2
- PUBLICATION DATE: February 1988
- CATEGORY: Training & Awareness
- COST: $11.00
- DESCRIPTION: This guide presents fundamental
- concepts, topics, and materials on many aspects of
- unclassified computer security that should be
- included in site level unclassified computer
- security awareness and training programs within DOE.
-
-
- AUTHOR: Not Specified
-
- TITLE: Safeguards and Security Manual. Section 12:
- Computer and Technical Security
-
- ORGANIZATION: EG&G Idaho, Inc.
-
- PUBLISHER/ORIGINATOR: None Specified
-
- REPORT NO: None Specified
- PUBLICATION DATE: April 8, 1987
- CATEGORY: Training & Awareness
- COST: Free
- DESCRIPTION: This section of the safeguards and
- security manual describes various computer security
- procedures for users and security managers. Includes
- security awareness training, computer protection
- plan, audit, risk analysis, and related topics.
-
-
-
- AUTHOR: N/A
-
- TITLE: Small Business Computer Security and
- Education Act of 1984
-
- ORGANIZATION:
-
- PUBLISHER/ORIGINATOR:
-
- REPORT NO: Public Law 98-362
- PUBLICATION DATE: July 16, 1984
- CATEGORY: Training & Awareness
- COST: Free
- DESCRIPTION: Amended the Small Business Act to
- establish a small business computer security and
- education program.
-
-
-
- AUTHOR: N/A
-
- TITLE: Training Requirement for the Computer
- Security Act
-
- ORGANIZATION: Office Personnel Management
-
- PUBLISHER/ORIGINATOR: Office of Personnel Management
- Federal Register Part II
- REPORT NO: Interim Regulation 5 CFR Part 930
- PUBLICATION DATE: July 13, 1988
- CATEGORY: Training & Awareness
- COST: Free
- DESCRIPTION: This regulation implements P.L. 100-
- 235, the Computer Security Act of 1987.
-
-