Critical Resources

  • National Institute of Standards and Technology (NIST)
    • Barker, E., & Roginsky, A. (2019, March ). Transitioning the Use of Cryptographic Algorithms and Key Lengths. NIST Special Publication 800-131A Revision 2. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf
    • National Institute of Standards and Technology (NIST). (2020). Introduction to Public Key Cryptography. Retrieved on November 24, 2023 from https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines
    • National Institute of Standards and Technology (NIST). (2023). Cybersecurity Framework (CSF) Version 1.1. Retrieved on December 6, 2023 from https://www.nist.gov/cyberframework
    • National Institute of Standards and Technology (NIST). (n.d.). Glossary – data structure. Retrieved on December 11, 2023 from https://csrc.nist.gov/glossary
    • National Institute of Standards and Technology (NIST). (2012). Guide for conducting risk assessments (Special Publication 800-30 Rev 1). https://csrc.nist.gov/pubs/sp/800/30/r1/final
    • National Institute of Standards and Technology (NIST). (2020). Risk Management Framework (RMF) for Information Systems and Organizations: A System Life Cycle Approach (Special Publication 800-37 Rev 2) https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
    • National Institute of Standards and Technology (NIST). (2020). Security and Privacy Controls for Information Systems and Organizations (Special Publication 800-53 Rev. 5). https://doi.org/10.6028/NIST.SP.800-53r5
  • Cybersecurity Infrastructure & Security Agency (CISA)
  • US-CERT
  • US Department of Defense (DOD)
    • United States Department of Defense. (2022). DoD Approved 8570 Baseline Certifications. Extension of Appendix 3 to the DoD 8570.01 Manual. Retrieved on December 1, 2022 from https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/
  • Department Of Justice (DOJ)
  • US Dept. of Health & Human Services (HHS)
  • US Government Accountability Office
    • United States Government Accountability Office, (2018) Weapon Systems Cybersecurity (GAO-19-128) https://www.gao.gov/assets/gao-19-128.pdf
  • NJ State (Contract Law)
    • New Jersey State. (2022). Local Public And Public School Contracts Law – Extraordinary Unspecifiable Services. Department of Community Affairs.  Retrieved on November 24, 2022 from  https://www.nj.gov/dca/divisions/dlgs/resources/rules_docs/5_34/njac_5342.pdf

Other

  • Code of Federal Regulations. (2022). 160.408 Factors considered in determining the amount of a civil money penalty. Retrieved on November 18, 2022 from https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-160/subpart-D/section-160.408
  • National Cyber Security Centre. (December 10, 2015). Understanding Vulnerabilities. What are vulnerabilities, and how are they exploited? Retrieved on February 27, 2023 from https://www.ncsc.gov.uk/information/understanding-vulnerabilities