566 KB | 3 files | PDF
Encryption has become a more accessible technology for securing your data, both in transit and on storage devices. But it still is not simple. The information in this article will help you grasp the basics of encryption tactics and standards.
Encryption has been identified by government agencies as a key technology in complying with the Health Insurance Portability and Accountability Act (HIPAA) and other privacy-related government regulation. Encryption technologies have matured dramatically in recent years, but implementing and managing an encryption solution is still a complex undertaking.
This article from the National Institute of Standards and Technology outlines the basic elements of encryption from the perspective of the health care industry, but the insights are valuable to anyone considering encryption as an option for protecting their valuable data. Issues covered include invisible applications, such as the Secure Socket Layer (SSL) or Transport Layer Security (TLS) protocols, as well as user-directed encryption in email programs and the like.
Included in this zip file are:
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ... More >>