Federal Information Processing Standards Publication 186

GPTKB entity

Statements (67)
Predicate Object
gptkbp:instance_of gptkb:government_agency
gptkbp:bfsLayer 2
gptkbp:bfsParent gptkb:award
gptkbp:amended_by gptkb:Federal_Information_Processing_Standards_Publication_186-1
gptkb:Federal_Information_Processing_Standards_Publication_186-2
gptkb:Federal_Information_Processing_Standards_Publication_186-3
gptkbp:content_type technical standard
https://www.w3.org/2000/01/rdf-schema#label Federal Information Processing Standards Publication 186
gptkbp:impact information security
gptkbp:is_adopted_by gptkb:private_sector
gptkbp:is_standardized_by gptkb:U._S._government
gptkbp:objective specifies methods for digital signatures
gptkbp:published_by gptkb:Research_Institute
gptkbp:published_year gptkb:1994
gptkbp:regulatory_compliance federal contracts
gptkbp:related_to gptkb:NIST_Special_Publication_800-56_A
gptkb:NIST_Special_Publication_800-57
gptkb:NIST_Special_Publication_800-90_A
gptkb:XMPP_Extension_Protocol
gptkb:Certification
gptkb:software_framework
gptkb:SHA-1
gptkb:SHA-3
gptkb:SHA-2
gptkb:currency
gptkb:X.509_certificates
cybersecurity
data integrity
encryption
risk management
RSA algorithm
authentication
cloud security
data protection
digital signatures
identity verification
incident response
key management
network security
secure communications
security audits
security training
electronic signatures
federal regulations
secure transactions
penetration testing
compliance standards
privacy laws
integrity
digital forensics
non-repudiation
security frameworks
secure email
software security
hardware security
vulnerability assessments
security awareness programs
information assurance
mobile security
ECDSA algorithm
IT security policies
secure web transactions
Io T security
ISO/ IEC standards
DSA algorithm
gptkbp:title gptkb:award
gptkbp:used_in federal agencies