Copyright © LLC, Nonprofit, Decorated War Veteran
Signed in as:
filler@godaddy.com
Personalized and Confidential Information Assurance Services for Decision-Makers and High-Profile Individuals
Because We Are A Nonprofit Organization, We Can Focus On You, Not Shareholders
Security, Privacy, and Peace of Mind to Ensure Your Success in the Digital World
Cybersecurity: https://www.nist.gov/topics/cybersecurity
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation. (https://niccs.us-cert.gov/glossary#C)
Guide to Industrial Control Systems (ICS) Security: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf
An Industrial Control System (ICS) is an information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control critical infrastructure assets. (https://niccs.us-cert.gov/glossary#I)
National Vulnerability Database: https://nvd.nist.gov/
An evaluation methodology whereby assessors search for vulnerabilities
and attempt to circumvent the security features of a network and/or
information system. (https://niccs.us-cert.gov/glossary#P)
Digital & Multimedia Evidence: https://www.nist.gov/topics/digital-multimedia-evidence
Digital forensics (also known as cyberforensics) is a branch of forensic science related to the recovery and investigation of artifacts found in digital devices. It includes the processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes. (https://niccs.us-cert.gov/glossary#D)
Guide for Applying the Risk Management Framework:
https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/draft
The process of identifying, analyzing, assessing, and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.(https://niccs.us-cert.gov/glossary#R)
NIST Cloud Computing Program: https://www.nist.gov/programs-projects/nist-cloud-computing-program-nccp
Framework for Improving Critical Infrastructure Cybersecurity: https://csrc.nist.gov/publications/detail/white-paper/2017/12/05/cybersecurity-framework-v11/draft
Artificial Intelligence:
https://www.nist.gov/topics/artificial-intelligence/ai-resources
Robotics Test Facility: https://www.nist.gov/laboratories/tools-instruments/robotics-test-facility
Security and Privacy Controls: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Networks of ‘Things’: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-183.pdf
Cryptography: https://www.nist.gov/topics/cryptography
Tysons Corner, VA
Security and Privacy
Executive Director: Michael Hancock
Copyright © LLC, Nonprofit, Decorated War Veteran