Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Publications
|
gptkbp:addresses |
cryptographic key lengths
|
gptkbp:administered_by |
gptkb:2019
|
gptkbp:applies_to |
federal information systems
|
gptkbp:developed_by |
gptkb:NIST_Computer_Security_Division
|
gptkbp:focuses_on |
gptkb:crypt
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-131 A
|
gptkbp:includes |
best practices for cryptography
|
gptkbp:is_adopted_by |
gptkb:educational_institutions
non-profit organizations international organizations state governments private sector security frameworks |
gptkbp:is_applicable_to |
private sector organizations
|
gptkbp:is_cited_in |
gptkb:academic_research
gptkb:NIST_SP_800-53 industry standards policy documents regulatory frameworks technical reports government reports ISO/ IEC standards |
gptkbp:is_designed_to |
information security professionals
|
gptkbp:is_influenced_by |
emerging threats
advancements in cryptography cryptographic research global cybersecurity trends |
gptkbp:is_part_of |
gptkb:National_Guard
gptkb:Cybersecurity gptkb:NIST_Special_Publication_series federal cybersecurity initiatives information assurance practices national cybersecurity policy federal cybersecurity strategy federal information security management federal risk management framework national information assurance strategy |
gptkbp:is_referenced_in |
security policies
technical guidelines best practice guidelines FIPS publications |
gptkbp:is_related_to |
gptkb:Cybersecurity
data protection laws encryption standards cryptographic standards information security standards |
gptkbp:is_reviewed_by |
academic institutions
industry experts government oversight bodies cryptography experts |
gptkbp:is_updated_by |
gptkb:NIST_SP_800-131_B
|
gptkbp:is_used_by |
government agencies
|
gptkbp:is_used_for |
security audits
compliance assessments |
gptkbp:is_used_in |
risk management processes
security training programs |
gptkbp:provides_guidance_on |
encryption methods
transitioning to stronger cryptographic algorithms |
gptkbp:published_by |
gptkb:NIST
|
gptkbp:recommendation |
key management practices
|
gptkbp:replaces |
gptkb:NIST_SP_800-131
|
gptkbp:bfsParent |
gptkb:FIPS_140
gptkb:FIPS_PUB_197 |
gptkbp:bfsLayer |
5
|