Mind Chasers Inc.

Overview of US Federal Online Resources

USA Federal Government Resources applicable to Online Privacy and Security work including CVE databases.

advertisement:

Overview

The links below are to resources provided by the US Federal Government that are related to cybersecurity and comprise regulations, rules, commentary, engineering resources, and databases & statistics on security incidents.

Where to start:

Science and Engineering

  • National Science Foundation (NSF): nsf.gov
  • National Institute of Standards and Technology (NIST): nist.gov
  • Sandia National Labs: sandia.gov

Federal Regulations

  • An acronym to know: CFR (Code of Federal Regulations)
  • regulations.gov
    general search engine for rules, proposed rules, and notices. Users can post comments and participate in petitions. Prepare to be overwhelmed!
  • Electronic Code of Federal Regulations with e-CFR
    The electronic code is a current but unofficial editorial compilation of CFR material and Federal Register amendments, so you may want to further review the disclaimers at the site.

Federal Telecom and Datacom

Online Security and Security Incidents

The CVE database was launched by MITRE as a community effort in 1999, and the U.S. National Vulnerability Database (NVD) was launched by the National Institute of Standards and Technology (NIST) in 2005. The CVE database feeds into the NVD.

  • Acronyms to know: CVE (Common Vulnerabilities and Exposures) and CNA (CVE Numbering Authority)
  • MITRE's CVE Database and Information
    "MITRE is a private, not-for-profit corporation"
  • NIST's National Vulnerability Database NVD
    Database including feeds, visualizations, and search.
  • United States Computer Emergency Readiness Team: US-CERT
    Reporting of security incidents, threats and reports
  • US-CERT provides weekly summaries of new vulnerabilities in the form of bulletins
  • NSF Cybersecurity Special Report
  • NIST Cybersecurity Framework
    "The Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk."

We update our site daily with new content related to our open source approach to network security and system design. If you would like to be notified about these changes, then please follow us on Twitter and join our mailing list.

Related articles on this site:

share
mailing list:

Please help us improve this article by adding your comment or question:

For enhanced features and capabilities, please sign in or authenticate using a popular third party

your email address will be kept private
previous month
next month
Su
Mo
Tu
Wd
Th
Fr
Sa
loading