Tags » NIST

NIST SP 800-30

Risk Assessment Steps

  1. System Characterization
  2. Threat Identification
  3. Vulnerability Identification
  4. Control Analysis
  5. Likelihood Determination
  6. Impact Analysis
  7. Risk Determination
  8. Control Recommendations
  9. Results Documentation

Back to School for the Metric System

One of the supporters of my documentary project is Nicholas Seet and as a result of my contact with him, I started a class a month ago called “Financing the Entrepreneurial Enterprise.” 622 more words

Metric System

Nanotechnology Could Provide Important Societal and Economic Benefits: Study Suggests 6 Million People Working in Nanomaterials by 2020

Considered by some to be the next frontier of global economic development, nanotechnology has the potential to revolutionize industries like healthcare, information technology and energy systems. 209 more words


"NIST on a Chip"? NIST Quantum Probe Enhances Electric Field Measurements: Radar, Wireless Communications & Medical Applications

Researchers at the National Institute of Standards and Technology (NIST) and the University of Michigan have demonstrated a technique based on the quantum properties of atoms that directly links measurements of electric field strength to the International System of Units (SI).* 622 more words


Finding the 'Holy Grail' for Solar Energy "Are We (almost) There Yet?"

*** “Throw-Back Thursdays” - Maybe not so much! Today’s Post(s) are a compilation of some of 2014’s LATEST advances in making Solar Renewable Energy  3,594 more words

Disaster Resilience Framework Document

Some of you may be interested in the Disaster Resilience Framework Document.   The Disaster Resilience Framework has been developed by the Engineering Laboratory at the National Institute of Standards and Technology (NIST) in the USA.   116 more words


CYBR650 Week 6 - Cyber Threats

What devices do you have in your home, your school, or business that you do business on every day?  Like other users, most are contempt on simply using their equipment to access the network and without any forethought to hackers on the “net” that may be trying to gain access.  417 more words

Cyber Security