Academic literature on the topic 'NIST SP 800-53'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NIST SP 800-53.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "NIST SP 800-53"

1

Asari, Cindy, and Yulhendri -. "Manajemen Risiko Sistem Informasi Mengacu pada NIST SP 800-30 dan NIST SP 800-53 rev.5." Jurnal Teknologi Dan Sistem Informasi Bisnis 5, no. 4 (2023): 420–30. http://dx.doi.org/10.47233/jteksis.v5i4.898.

Full text
Abstract:
Melalui Balai Penelitian, Kementerian Pertanian memanfaatkan penggunaan website yaitu bsip.pertanian.go.id yang bertujuan untuk keperluan membantu pengguna dengan cara penyebaran informasi. Dalam pengelolaan sistem informasi ini, teknologi informasi merupakan salah satu bagian terpenting, di mana keberhasilan pelayanan tergantung sejauh mana manajemen teknologi informasi telah berkembang. Namun, bahaya yang mengancam kelangsungan sistem informasi sering berkembang. Tujuan dari penelitian ini adalah untuk menentukan risiko dan saran atau rekomendasi untuk penanganan risiko tersebut yang berdasa
APA, Harvard, Vancouver, ISO, and other styles
2

Afiansyah, Hafizh Ghozie, and Amiruddin Amiruddin. "Perancangan Rencana Tata Kelola dan Manajemen Teknologi Informasi Menggunakan COBIT 2019 dan NIST SP 800-53 Rev 5 (Studi Kasus: Instansi Pemerintah ABC)." Info Kripto 16, no. 1 (2022): 33–39. http://dx.doi.org/10.56706/ik.v16i1.38.

Full text
Abstract:
Untuk mendukung fungsinya sebagai instansi pemerintahan, Instansi Pemerintah ABC menggunakan layanan teknologi informasi (TI) untuk membantu proses bisnis dan penyediaan layanan publik. Untuk mendapatkan hasil yang maksimal dari penggunaan TI, diperlukan adanya rencana tata kelola dan manajemen terhadap TI sehingga penggunaanya dapat sejalan dengan tujuan dan capaian yang diinginkan dari instansi. Pada penelitian ini, dilakukan perancangan rencana tata kelola dan manajemen TI untuk Instansi Pemerintah ABC dengan menggunakan kerangka kerja COBIT 2019 dan kendali dari NIST SP 800-53 Rev 5. Hasil
APA, Harvard, Vancouver, ISO, and other styles
3

Kioskli, Kitty, Eleni Seralidou, and Nineta Polemi. "A Practical Human-Centric Risk Management (HRM) Methodology." Electronics 14, no. 3 (2025): 486. https://doi.org/10.3390/electronics14030486.

Full text
Abstract:
Various standards (e.g., ISO 27000x, ISO 31000:2018) and methodologies (e.g., NIST SP 800-53, NIST SP 800-37, NIST SP 800-161, ETSI TS 102 165-1, NISTIR 8286) are available for risk assessment. However, these standards often overlook the human element. Studies have shown that adversary profiles (AP), which detail the maturity of attackers, significantly affect vulnerability assessments and risk calculations. Similarly, the maturity of the users interacting with the Information and Communication Technologies (ICT) system in adopting security practices impacts risk calculations. In this paper, w
APA, Harvard, Vancouver, ISO, and other styles
4

Afiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329–38. https://doi.org/10.25126/jtiik.20236507.

Full text
Abstract:
Pada Institut XYZ, unit kerja yang memiliki tanggung jawab untuk mengelola layanan teknologi informasi dan pusat data adalah Unit TI. Berdasarkan Peraturan Pemerintah Nomor 71 Tahun 2019, untuk menanggulangi dampak kehilangan layanan pada pusat data yang disebabkan oleh bencana dan ancaman, diperlukan adanya rencana yang bertujuan untuk mencegah kehilangan dan kerusakan, yaitu rencana pemulihan bencana atau DRP. Hal tersebut didukung dengan kuesioner dan wawancara yang dilakukan kepada jajaran pejabat struktural, kepala unit dan mahasiswa Institut XYZ yang menyatakan bahwa layanan yang dikelol
APA, Harvard, Vancouver, ISO, and other styles
5

Afiansyah, Hafizh Ghozie, Septia Ulfa Sunaringtyas, and Amiruddin Amiruddin. "Perancangan Rencana Pemulihan Bencana Menggunakan NIST SP 800-34 Rev 1, NIST SP 800-53 Rev 5 dan SNI 8799 (Studi Kasus: Unit TI XYZ)." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 2 (2023): 329. http://dx.doi.org/10.25126/jtiik.20231026507.

Full text
Abstract:
<p><span>Pada Institut XYZ, unit kerja yang memiliki tanggung jawab untuk mengelola layanan teknologi informasi dan pusat data adalah Unit TI. Berdasarkan Peraturan Pemerintah Nomor 71 Tahun 2019, untuk menanggulangi dampak kehilangan layanan pada pusat data yang disebabkan oleh bencana dan ancaman, diperlukan adanya rencana yang bertujuan untuk mencegah kehilangan dan kerusakan, yaitu rencana pemulihan bencana atau DRP. Hal tersebut didukung dengan kuesioner dan wawancara yang dilakukan kepada jajaran pejabat struktural, kepala unit dan mahasiswa Institut XYZ yang menyatakan bahwa
APA, Harvard, Vancouver, ISO, and other styles
6

Maksymov, Anton. "Analysis of risk management standards and their application in IT projects." Management of Development of Complex Systems, no. 61 (March 28, 2025): 66–75. https://doi.org/10.32347/2412-9933.2025.61.66-75.

Full text
Abstract:
Risk management is a critical aspect of successful project implementation in the field of information technology, as IT projects are often subject to high levels of uncertainty and complexity. Insufficient risk management can lead to significant losses, budget overruns, delays in project timelines, and reduced quality of the final product. Consequently, there is a need for the application of reliable standards to ensure effective identification, analysis, and monitoring of risks throughout the entire lifecycle of an IT project. The objective of this study is to analyze existing risk management
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–108. http://dx.doi.org/10.60087/jklst.vol2.n1.p108.

Full text
Abstract:
This research aims to investigate the cloud security metrics by exploring the existing frameworks, integrated approaches and quantitative measurements to enhance overall security in cloud environments. This study explains several established frameworks and standards, such as the CSA Cloud Controls Matrix, NIST SP 800-53 and ISO/IEC 27001, which are important in guiding organizations towards strong security practices. Moreover, a qualitative research method has been used in this research study, conducting a literature review of past studies on the same topic. The challenges and limitations rega
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmadi, Sina. "Cloud Security Metrics and Measurement." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 1 (2023): 93–107. http://dx.doi.org/10.60087/jklst.vol2.n1.p107.

Full text
Abstract:
This research aims to investigate the cloud security metrics by exploring the existing frameworks, integrated approaches and quantitative measurements to enhance overall security in cloud environments. This study explains several established frameworks and standards, such as the CSA Cloud Controls Matrix, NIST SP 800-53 and ISO/IEC 27001, which are important in guiding organizations towards strong security practices. Moreover, a qualitative research method has been used in this research study, conducting a literature review of past studies on the same topic. The challenges and limitations rega
APA, Harvard, Vancouver, ISO, and other styles
9

Santosa, Iqbal, and Rahmat Mulyana. "Information Technology Risk Control of University in a Work from Home Situations." Journal of Information Systems and Informatics 4, no. 4 (2022): 1008–18. http://dx.doi.org/10.51519/journalisi.v4i4.393.

Full text
Abstract:
The University is one of the educational institutions affected by the COVID-19 pandemic. Most of its activities, which are academic management, human resource management, information technology services, and so on were changed into WFH (Work from Home) supported by information technology. Utilization of information technology in supporting WFH can create various risks and needs to be controlled either preventive, detective, or corrective to minimize the impact. This research will focus on planning for university information technology risk control in working from home conditions by referring t
APA, Harvard, Vancouver, ISO, and other styles
10

Manuja, Prashant, Rajveer Singh Shekhawat, and Umashankar Rawat. "Design & analysis of novel IT security framework for overcoming data security & privacy challenges." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 885–98. http://dx.doi.org/10.47974/jdmsc-1776.

Full text
Abstract:
IT security has always been a major concern for all organizations, especially after the rise in IT Integration amongst all processes, Post pandemic this has become a bigger issue than earlier. The organizations are growing also with IT Integration the negative impact of information related risk incidents are also increasing worldwide. There are several IT Risk Assessment Frameworks in use to address information security assaults, vulnerabilities, threats, and breaches, including ISO 270001/27005. COBIT, NIST SP- 800/53 etc, though following and implementation of these protocols, still organiza
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "NIST SP 800-53"

1

Rafaels, Raymond. Guide to Understanding Security Controls: NIST SP 800-53 Rev 5. Independently published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rafaels, Mr Ray. Guide to Understanding Security Controls: NIST SP 800-53 Rev 4. Independently published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Information security policy development for compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0. CRC Press, Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Barry L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Williams, Barry L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Williams, Barry L. Information Security Policy Development for Compliance: ISO/Iec 27001, Nist Sp 800-53, Hipaa Standard, PCI Dss V2. 0, and Aup V5. 0]. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, Barry L. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2. 0, and AUP V5. 0. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "NIST SP 800-53"

1

El Marzak, Youssef, Khalifa Mansouri, and Sophia Faris. "A Comprehensive Metamodel for Cybersecurity: Based on NIST SP 800-53 Revision 5 Security and Privacy Controls." In Sustainable Civil Infrastructures. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86705-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elmarkez, Ahmed, Soraya Mesli-Kesraoui, Flavio Oquendo, Pascal Berruet, and Djamal Kesraoui. "A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog." In Information Security Theory and Practice. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60391-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bobbert, Yuri, and Maria Chtepen. "Research Findings in the Domain of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch008.

Full text
Abstract:
This chapter studies the mapping of governance and security control objectives impacted by DevOps to the corresponding DevOps control objectives. These DevOps objectives introduce either an opportunity or a risk for the achievement of the security and governance control objectives. Finally, the artifact defines a list of SecDevOps controls that have proven to be effective in combining the agility of the DevOps paradigm with the security compliance assurance. The authors examine in collaboration with experts the multiple frameworks to be suitable. The authors define SecDevOps controls that have
APA, Harvard, Vancouver, ISO, and other styles
4

Akowuah, Francis E., Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, and Hong Wang. "Standards and Guides for Implementing Security and Privacy for Health Information Technology." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch030.

Full text
Abstract:
In this chapter, the authors survey security standards and guides applicable to healthcare industry including control objective for information and related technologies (COBIT), ISO/IEC 27001:2005 (which has been revised by ISO/IEC 27001:2013), ISO/IEC 27002:2005 (which has been revised by ISO/IEC 27002:2013), ISO 27799:2008 (which has been revised by ISO 27799:2016), ISO 17090:2008 (which has been revised by ISO 17090:2015), ISO/TS 25237:2008, HITRUST common security framework (CSF), NIST Special Publication 800-53, NIST SP 1800, NIST SP 1800-8, and building code for medical device software s
APA, Harvard, Vancouver, ISO, and other styles
5

Akowuah, Francis E., Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, and Hong Wang. "Standards and Guides for Implementing Security and Privacy for Health Information Technology." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch030.

Full text
Abstract:
In this chapter, the authors survey security standards and guides applicable to healthcare industry including control objective for information and related technologies (COBIT), ISO/IEC 27001:2005 (which has been revised by ISO/IEC 27001:2013), ISO/IEC 27002:2005 (which has been revised by ISO/IEC 27002:2013), ISO 27799:2008 (which has been revised by ISO 27799:2016), ISO 17090:2008 (which has been revised by ISO 17090:2015), ISO/TS 25237:2008, HITRUST common security framework (CSF), NIST Special Publication 800-53, NIST SP 1800, NIST SP 1800-8, and building code for medical device software s
APA, Harvard, Vancouver, ISO, and other styles
6

Akowuah, Francis E., Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, and Hong Wang. "Standards and Guides for Implementing Security and Privacy for Health Information Technology." In Security and Privacy Management, Techniques, and Protocols. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5583-4.ch008.

Full text
Abstract:
In this chapter, the authors survey security standards and guides applicable to healthcare industry including control objective for information and related technologies (COBIT), ISO/IEC 27001:2005 (which has been revised by ISO/IEC 27001:2013), ISO/IEC 27002:2005 (which has been revised by ISO/IEC 27002:2013), ISO 27799:2008 (which has been revised by ISO 27799:2016), ISO 17090:2008 (which has been revised by ISO 17090:2015), ISO/TS 25237:2008, HITRUST common security framework (CSF), NIST Special Publication 800-53, NIST SP 1800, NIST SP 1800-8, and building code for medical device software s
APA, Harvard, Vancouver, ISO, and other styles
7

Sabillon, Regner. "Audits in Cybersecurity." In Research Anthology on Business Aspects of Cybersecurity. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch001.

Full text
Abstract:
The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading organizations are providing for security and auditing professionals to follow. The chapter reviews relevant features for auditing approaches in the following order: ISO/IEC 27001:2013, ISO/IEC 27002:2013, Control Objectives for Information and Related Technology (COBIT) 2019, Information Technology Infrastructure Library (ITIL) 4, AICPA, ISACA, NI
APA, Harvard, Vancouver, ISO, and other styles
8

"Audits in Cybersecurity." In Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4162-3.ch007.

Full text
Abstract:
The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading organizations are providing for security and auditing professionals to follow. The chapter reviews relevant features for auditing approaches in the following order: ISO/IEC 27001:2013, ISO/IEC 27002:2013, Control Objectives for Information and Related Technology (COBIT) 2019, Information Technology Infrastructure Library (ITIL) 4, AICPA, ISACA, NI
APA, Harvard, Vancouver, ISO, and other styles
9

Bobbert, Yuri, and Maria Chtepen. "Findings and Core Practices in the Domain of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch009.

Full text
Abstract:
In this chapter, the authors describe the findings and conclusions on “The SecDevOps Capability Artifact.” It is validated by means of an extensive academic literature review and interviews with multiple domain experts and practitioners. An additional validation was performed by comparing the findings of this study with high-level implementation and operational guidance of the DoD enterprise DevSecOps reference design report. The report has as a purpose to describe the DevSecOps lifecycle and supporting pillars, in line with NIST cybersecurity framework, which is a high-level framework buildin
APA, Harvard, Vancouver, ISO, and other styles
10

Box Debra and Pottas Dalenca. "Trust – Can it be controlled?" In Studies in Health Technology and Informatics. IOS Press, 2010. https://doi.org/10.3233/978-1-60750-588-4-651.

Full text
Abstract:
Trust is an important component in the security of an information system. The advent of the electronic health record (EHR) and the health information system (HIS) have raised it to greater prominence. These systems and their intended benefits are rendered less effective through a low level of trust between the stakeholders. The potential reciprocal relationship between accountability and trust is investigated. A literature study examines both concepts and their interrelationship. The accountability and audit controls provided by the NIST SP 800-53 security guide and the ISO 27799 security stan
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "NIST SP 800-53"

1

Mahfud, Ahmad Zainudin, Ira Rosianal Hikmah, Septia Ulfa Sunaringtyas, and Tiyas Yulita. "Information Security Risk Management Design Based on ISO/IEC 27005:2022, ISO/IEC 27001:2022, and NIST SP 800-53 Revision 5 (A Case Study at ABC Agency)." In 2024 4th International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS). IEEE, 2024. https://doi.org/10.1109/ice3is62977.2024.10775428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amiruddin, Amiruddin, Hafizh Ghozie Afiansyah, and Hernowo Adi Nugroho. "Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8." In 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2021. http://dx.doi.org/10.1109/icimcis53775.2021.9699337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Safitri, Ellisa Hani Nur, and Herman Kabetta. "Cyber-Risk Management Planning Using NIST CSF V1.1, ISO/IEC 27005:2018, and NIST SP 800-53 Revision 5 (A Study Case to ABC Organization)." In 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs). IEEE, 2023. http://dx.doi.org/10.1109/icocics58778.2023.10277652.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "NIST SP 800-53"

1

Dempsey, Kelley, Greg Witte, and Doug Rike. Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. National Institute of Standards and Technology, 2014. http://dx.doi.org/10.6028/nist.cswp.02192014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dempsey, Kelley, Greg Witte, and Doug Rike. Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. National Institute of Standards and Technology, 2014. http://dx.doi.org/10.6028/nist.cswp.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!