1. <small id="jeg3a"><menu id="jeg3a"></menu></small>
      <mark id="jeg3a"></mark>
        <label id="jeg3a"></label>
      1. <tt id="jeg3a"><button id="jeg3a"></button></tt>
        <tt id="jeg3a"><ruby id="jeg3a"></ruby></tt>
          <small id="jeg3a"><strong id="jeg3a"></strong></small>
          <tt id="jeg3a"><ol id="jeg3a"><source id="jeg3a"></source></ol></tt>

          <listing id="jeg3a"></listing>

          <listing id="jeg3a"><cite id="jeg3a"></cite></listing>
          <label id="jeg3a"></label>
          Skip to main content
          U.S. flag

          An official website of the United States government

          Dot gov

          The .gov means it’s official.
          Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

          Https

          The site is secure.
          The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

          Cybersecurity

          NIST implements practical cybersecurity and privacy through outreach and effective application of standards and best practices necessary for the U.S. to adopt cybersecurity capabilities.

          With a world-class measurement and testing laboratory encompassing a wide range of areas of computer science, mathematics, statistics, and systems engineering, NIST’s cybersecurity program supports its overall mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through research and development in ways that enhance economic security and improve our quality of life.?

          The need for cybersecurity standards and best practices that address interoperability, usability and privacy continues to be critical for the nation. NIST’s cybersecurity programs seek to enable greater development and application of practical, innovative security technologies and methodologies that enhance the country’s ability to address current and future computer and information security challenges.?

          News and Updates

          Events

          Industry Impacts

          Wireless Infusion Pump Security

          Infusion pumps were once standalone instruments that interacted only with the patient or medical provider. With technological improvements designed to enhance

          Cybersecurity Framework

          More than ever, organizations must balance a rapidly evolving cyber threat landscape against the need to fulfill business requirements. To help these

          Projects and Programs

          Technical Security Guidance Program

          Security is becoming increasingly complicated and difficult both on technical grounds and on policy grounds. Technically, Federal agencies and other have to

          Lightweight Cryptography

          NIST is investigating the need for lightweight cryptographic algorithms. This includes looking at applications that may require lightweight algorithms as well

          Publications

          Software

          Baseline Tailor

          Baseline Tailor is a software tool for using the United States government's Cybersecurity Framework and for tailoring the NIST Special Publication (SP) 800-53

          Awards

          秋霞理论在一l级