Mindblown: a blog about philosophy.

  • Federal Information Security Management Act

    Federal Information Security Management Act (FISMA) Federal Information Security Management Act (FISMA) is the Federal Information Security Management Act of 2002. It was passed as Title III of the E-Government Act (Public Law 107-347) in December 2002. FISMA requires each federal agency to develop, document, and implement an agency-wide program to provide information security for…

  • Supply Chain Risk Management (SCRM)

    Supply Chain Risk Management (SCRM) Supply Chain Risk Management in the United States Overview Due to the growing sophistication and complexity of information and communications technology (ICT) and the ICT supply chains, federal agency information systems are increasingly at risk of compromise. Information and communications technology supply chain risks may include insertion of counterfeits, unauthorized…

  • Computer Security Division

    Computer Security Division Today’s information technology (IT) environment includes the continued proliferation of information, the rapid growth of devices connecting to the communications infrastructure, and an evolving threat environment. All of these factors create the need for cybersecurity standards and best practices addressing interoperability, usability and privacy, which continue to be critical to the Nation.…

  • Mobile Security

    Mobile Security Mobile Devices With the trend toward a highly mobile workforce, the acquisition of handheld devices such as Personal Digital Assistants (PDAs) and PC tablets is growing at an ever-increasing rate. These devices offer productivity tools in a compact form and are quickly becoming a necessity in today’s business environment. Many manufacturers make handheld…

  • Smart Grid Interoperability Panel

    Smart Grid Interoperability Panel (SGIP) Introduction The Smart Grid Interoperability Panel (SGIP) is a United States membership-based organization established by the U.S. National Institute of Standards and Technology (NIST) and administered by its members, as facilitated by a NIST contractor. It provides an open process for stakeholders to participate in providing input and cooperating with…

  • Electronic Authentication

    Electronic Authentication Electronic Authentication is the process of establishing confidence in user identities that are presented in online environments. Application developers are often faced with a choice of mechanisms based on a wide variety of technologies to perform local or remote authentication. The use of multifactor authentication (MFA) adds an increased layer of security to…

  • Freedom of Information Act

    Freedom of Information Act The Freedom of Information Act, enacted in 1966, provides that any person has a right, enforceable in court, of access to federal agency records, except to the extent that such records are protected from disclosure by one of nine exemptions or by one of three special law enforcement records exclusions. SUMMARY…

  • National Institute of Standards and Technology

    National Institute of Standards and Technology (US Agency) The National Institute of Standards and Technology (NIST) was an agency of the U.S. Department of Commerce. The National Institute of Standards and Technology was founded in 1901 as the nation’s first federal physical science research laboratory. Over the years, the scientists and technical staff at National…

  • Encryption

    Encryption Articles about Encryption & Cryptography EFF’s “What’s HOT in Encryption” EFF “Privacy, Security, Crypto, & Surveillance” Archive Crypt NewsLetter The Encryption Policy Resource Page Cryptography’s Role in Securing the Information Society Electronic Banking: Banking Has Important Stake in Unfolding Cryptography Regulations (Richard L. Field) Cryptography: The Study of Encryption Law And The Net: Steptoe…

  • Information Infraestructure

    Information Infraestructure Papers, Articles, Reports, and Speeches National Information Infrastructure: Myths, Metaphors and Realities (Malhotra et al.) This paper, arguably, represents the first initiative to integratively review the key issues and principles that underlie the concept of the NII, the primary stakeholders participating in its implementation, the current status of these issues and the future…

Got any book recommendations?