2020
DOI: 10.6028/nist.sp.800-209
|View full text |Cite
|
Sign up to set email alerts
|

Security Guidelines for Storage Infrastructure

Abstract: This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercis… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Similarly, psychologists should seek wireless access point (WAP) routers that give them or their organization full network control access (Chandramouli & Pinhas, 2020;Grassi et al, 2020). These routers provide wireless access to a wired network.…”
Section: Network Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…Similarly, psychologists should seek wireless access point (WAP) routers that give them or their organization full network control access (Chandramouli & Pinhas, 2020;Grassi et al, 2020). These routers provide wireless access to a wired network.…”
Section: Network Controlmentioning
confidence: 99%
“…To limit the potential for viruses, Ransomware, or other malware, psychologists should utilize automated risk detection and prevention software. Such programs should not only provide general ongoing monitoring for all data on the system/ database, but also conduct scheduled scans of all the systems to ensure nothing has become compromised (Chandramouli & Pinhas, 2020;Grassi et al, 2020). As there is a multitude of free and paid malware software packages, psychologists are suggested to review each for specific features to meet their needs.…”
Section: Malware Software and Continuous Data Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main concerns are about confidentiality, integrity and privacy of the outsourced data [2,3] CSPs are leveraging cryptography as lever for mitigating security concerns in order to strength confidence of end users on their services. Cryptography can be involved in two major levels of security, namely secure storage [11,[4][5][6][7] and secure gain provided by the solution. The lack of detailed technical information about the solution and about the span of its adoption by final cloud users make the final statement very difficult.…”
Section: Introductionmentioning
confidence: 99%
“…More people can only access information services with secure data transfer. Chandramouli & Pinhas (2020) argue that data encryption is a fundamental security method used to protect computer data stored outside of system memory to stop data theft and other malicious activities. Encrypted data makes essential documents much more secure as it makes them difficult to decrypt, even if lost or leaked.…”
mentioning
confidence: 99%