ipl-logo

NIST Special Presentation

1104 Words5 Pages

NIST SPECIAL PUBLICATIONS
Abdul Nayyer Mohammad Stephen Hyzny (Instructor) DATE: 3/6/2016 GOVERNORS STATE UNIVERSITY

Introduction NIST is a series of publications developed as a consequence of thorough exploration into workable for upgrading the security of information technology frameworks and systems in a proactive way. NIST is nothing but a catalog of controls which is being used in getting compliance …show more content…

It is mainly a part of special publication 800 series which gives the information about research and outreach initiatives in the information security system and also the about the actions with industry and government organizations. This NIST special publication is mainly divided into security controls like common, custom and hybrid categories. The category under the hybrid control is a standard control and is used to customize the requirements for a particular application. The category under the Custom control is used by an individual application. There are some other controls which comes under this NIST are Access Control, Configuration Management, Incident Response, Maintenance etc. The Access Control deals with the setting which are used for the information stored on the systems and also it is used to understand the session timeout settings for the developers. The Configuration management deals with the establishment and to identify the software installations. The Incident Response deals with the auditable setting to support the responses. The management deals with the controls on how to maintain the audit records and repairs on information …show more content…

This publication mainly focuses on the organizations and system owners to make sanitization decisions depending upon the types of confidentiality of their information. The key element of this publication is assuring the confidentiality. It also states that the types of media that are used to capture and transfer the information must be determined at the phase of the requirements for a particular system.

This NIST is the process that renders that access to target data for a given level of effort and the organizations must focus on the information that has been stored on the media, rather than to focus on the media itself. The controls that are responsible for safeguarding in the organizations they must use secure media. There are three types of sanitization one is Clear the second one is Purge and the third one is Destroy. The First one Clear deal with the techniques that are used to sanitize the data in all user address storage locations in order to protect against noninvasive recovery techniques and this is done with Read and Write commands on the storage device. The second one Purge deals with the techniques that target data recovery using state of the art lab techniques. The third one Destroy deals with the target information recovery infeasible and results not to use media for storage

More about NIST Special Presentation

Open Document