Academic literature on the topic 'NIST SP 800-53'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NIST SP 800-53.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "NIST SP 800-53"
Asari, Cindy, and Yulhendri -. "Manajemen Risiko Sistem Informasi Mengacu pada NIST SP 800-30 dan NIST SP 800-53 rev.5." Jurnal Teknologi Dan Sistem Informasi Bisnis 5, no. 4 (2023): 420–30. http://dx.doi.org/10.47233/jteksis.v5i4.898.
Full textAfiansyah, Hafizh Ghozie, and Amiruddin Amiruddin. "Perancangan Rencana Tata Kelola dan Manajemen Teknologi Informasi Menggunakan COBIT 2019 dan NIST SP 800-53 Rev 5 (Studi Kasus: Instansi Pemerintah ABC)." Info Kripto 16, no. 1 (2022): 33–39. http://dx.doi.org/10.56706/ik.v16i1.38.
Full textKioskli, Kitty, Eleni Seralidou, and Nineta Polemi. "A Practical Human-Centric Risk Management (HRM) Methodology." Electronics 14, no. 3 (2025): 486. https://doi.org/10.3390/electronics14030486.
Full textAfiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329–38. https://doi.org/10.25126/jtiik.20236507.
Full textAfiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329. http://dx.doi.org/10.25126/jtiik.20231026507.
Full textMaksymov, Anton. "Analysis of risk management standards and their application in IT projects." Management of Development of Complex Systems, no. 61 (March 28, 2025): 66–75. https://doi.org/10.32347/2412-9933.2025.61.66-75.
Full textAhmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–108. http://dx.doi.org/10.60087/jklst.vol2.n1.p108.
Full textAhmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–107. http://dx.doi.org/10.60087/jklst.vol2.n1.p107.
Full textSantosa, Iqbal, and Rahmat Mulyana. "Information Technology Risk Control of University in a Work from Home Situations." Journal of Information Systems and Informatics 4, no. 4 (2022): 1008–18. http://dx.doi.org/10.51519/journalisi.v4i4.393.
Full textManuja, Prashant, Rajveer Singh Shekhawat, and Umashankar Rawat. "Design & analysis of novel IT security framework for overcoming data security & privacy challenges." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 885–98. http://dx.doi.org/10.47974/jdmsc-1776.
Full textBooks on the topic "NIST SP 800-53"
Rafaels, Raymond. Guide to Understanding Security Controls: NIST SP 800-53 Rev 5. Independently published, 2019.
Find full textRafaels, Mr Ray. Guide to Understanding Security Controls: NIST SP 800-53 Rev 4. Independently published, 2019.
Find full textNIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. Independently Published, 2022.
Find full textInformation security policy development for compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0. CRC Press, Taylor & Francis Group, 2013.
Find full textWilliams, Barry L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach Publishers, Incorporated, 2016.
Find full textWilliams, Barry L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach Publishers, Incorporated, 2016.
Find full textWilliams, Barry L. Information Security Policy Development for Compliance: ISO/Iec 27001, Nist Sp 800-53, Hipaa Standard, PCI Dss V2. 0, and Aup V5. 0]. Taylor & Francis Group, 2013.
Find full textWilliams, Barry L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach Publishers, Incorporated, 2016.
Find full textBook chapters on the topic "NIST SP 800-53"
El Marzak, Youssef, Khalifa Mansouri, and Sophia Faris. "A Comprehensive Metamodel for Cybersecurity: Based on NIST SP 800-53 Revision 5 Security and Privacy Controls." In Sustainable Civil Infrastructures. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86705-7_25.
Full textElmarkez, Ahmed, Soraya Mesli-Kesraoui, Flavio Oquendo, Pascal Berruet, and Djamal Kesraoui. "A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog." In Information Security Theory and Practice. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60391-4_5.
Full textBobbert, Yuri, and Maria Chtepen. "Research Findings in the Domain of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch008.
Full textAkowuah, Francis E., Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, and Hong Wang. "Standards and Guides for Implementing Security and Privacy for Health Information Technology." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch030.
Full textAkowuah, Francis E., Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, and Hong Wang. "Standards and Guides for Implementing Security and Privacy for Health Information Technology." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch030.
Full textAkowuah, Francis E., Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, and Hong Wang. "Standards and Guides for Implementing Security and Privacy for Health Information Technology." In Security and Privacy Management, Techniques, and Protocols. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5583-4.ch008.
Full textSabillon, Regner. "Audits in Cybersecurity." In Research Anthology on Business Aspects of Cybersecurity. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch001.
Full text"Audits in Cybersecurity." In Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4162-3.ch007.
Full textBobbert, Yuri, and Maria Chtepen. "Findings and Core Practices in the Domain of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch009.
Full textBox Debra and Pottas Dalenca. "Trust – Can it be controlled?" In Studies in Health Technology and Informatics. IOS Press, 2010. https://doi.org/10.3233/978-1-60750-588-4-651.
Full textConference papers on the topic "NIST SP 800-53"
Mahfud, Ahmad Zainudin, Ira Rosianal Hikmah, Septia Ulfa Sunaringtyas, and Tiyas Yulita. "Information Security Risk Management Design Based on ISO/IEC 27005:2022, ISO/IEC 27001:2022, and NIST SP 800-53 Revision 5 (A Case Study at ABC Agency)." In 2024 4th International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS). IEEE, 2024. https://doi.org/10.1109/ice3is62977.2024.10775428.
Full textAmiruddin, Amiruddin, Hafizh Ghozie Afiansyah, and Hernowo Adi Nugroho. "Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8." In 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2021. http://dx.doi.org/10.1109/icimcis53775.2021.9699337.
Full textSafitri, Ellisa Hani Nur, and Herman Kabetta. "Cyber-Risk Management Planning Using NIST CSF V1.1, ISO/IEC 27005:2018, and NIST SP 800-53 Revision 5 (A Study Case to ABC Organization)." In 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs). IEEE, 2023. http://dx.doi.org/10.1109/icocics58778.2023.10277652.
Full textReports on the topic "NIST SP 800-53"
Dempsey, Kelley, Greg Witte, and Doug Rike. Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. National Institute of Standards and Technology, 2014. http://dx.doi.org/10.6028/nist.cswp.02192014.
Full textDempsey, Kelley, Greg Witte, and Doug Rike. Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. National Institute of Standards and Technology, 2014. http://dx.doi.org/10.6028/nist.cswp.2.
Full text