Cryptographically secure pseudorandom number generators | Pseudorandom number generators | Broken cryptography algorithms
NIST SP 800-90A ("SP" stands for "special publication") is a publication by the National Institute of Standards and Technology with the title Recommendation for Random Number Generation Using Deterministic Random Bit Generators. The publication contains the specification for three allegedly cryptographically secure pseudorandom number generators for use in cryptography: (based on hash functions), (based on HMAC), and CTR DRBG (based on block ciphers in counter mode). Since June 24, 2015, the current version of the publication is Revision 1. Earlier versions included a fourth generator, Dual_EC_DRBG (based on elliptic curve cryptography). Dual_EC_DRBG was later reported to probably contain a kleptographic backdoor inserted by the United States National Security Agency (NSA), while the other three random number generators are accepted as uncontroversial and secure by multiple cryptographers. As a work of the US Federal Government, NIST SP 800-90A is in the public domain and freely available. (Wikipedia).
From playlist everything
SDS 600: Yoga Nidra Practice — with Steve Fazzari
#YogaNidra #YogaNidraPractice #FiveMinuteFriday Rest and relaxation await as Steve Fazzari joins us this week for a special edition of the podcast! Tune in for a rejuvenating session of Yoga Nidra led beautifully by the expert. Additional materials: www.superdatascience.com/600
From playlist Super Data Science Podcast
From playlist Tutorial 8
T4D #69 - ISO TECH kit, feedback and Hakko FX-888
------------------------------ Click "Show more" ------------------------------------------- A look at the ISO-TECH kit from RS Components (Paolo), some chit chat about questions raised from the last video...and a mini review / overview of the Hakko FX-888 solder station. Follow ISO-TECH h
From playlist Tip or Thought for the Day!
Trusted CI Webinar: Cybersecurity Maturity Model Certification (CMMC)
Slides: http://hdl.handle.net/2142/108404 The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent years have evidenced a trend toward increasing regulation. The latest in this trend is the US Department of Defense’s “Cybersecurity Maturity Mode
From playlist Center for Applied Cybersecurity Research (CACR)
Trusted CI Webinar Series: REED+: A cybersecurity framework for research data at Purdue University
Originally recorded April 22, 2019 Slides: http://hdl.handle.net/2142/103592 This video is presented by Preston Smith and Shawn Vest The REED+ framework integrates NIST SP 800-171 and other related NIST publications as the foundation of the framework. This framework serves as a sta
From playlist Center for Applied Cybersecurity Research (CACR)
Sample Report: https://github.com/hmaverickadams/TCM-Security-Sample-Pentest-Report ❓Info❓ ___________________________________________ Need a Pentest?: https://tcm-sec.com Learn to Hack: https://academy.tcm-sec.com 🔹The Cyber Mentor Merch🔹 ___________________________________________ http
From playlist Ethical Hacking Career Vids
IT Security Tutorial - Understanding Cyber Security RISKS
Uncover the basics of cybersecurity risks and how to source threat intelligence. Explore more IT Security courses and advance your skills on LinkedIn Learning: https://www.linkedin.com/learning/topics/security-3?trk=sme-youtube_M136048R124-06-03_learning&src=yt-other This is an excerpt fr
From playlist IT Security
Multimeter review / buyers guide: Fluke 87V / Fluke 87-5 Review
Buy the Fluke 87V here: http://astore.amazon.com/m0711-20/detail/B0002YFD1K This is a review of the Fluke 87V. This is Fluke's true RMS digital multimeter with 6000 / 20000 count. This is an industrial multimeter for electrical / electronics. I will be using this multimeter in a future s
From playlist Multimeter reviews, buyers guide and comparisons.
Introduction to Incident Response
This series of videos will talk about computer security incident response. Specifically, we will focus on the concerns of NSF funded cyber infrastructure projects.
From playlist Center for Applied Cybersecurity Research (CACR)
Why I love 4294967296? MegaFavNumbers.
Bitonic sorter: https://en.wikipedia.org/wiki/Bitonic_sorter Fast Fourier Transform https://en.wikipedia.org/wiki/Fast_Fourier_transform#:~:text=A%20fast%20Fourier%20transform%20(FFT,frequency%20domain%20and%20vice%20versa. #MegaFavNumbers I know that this video is horrible, but an invite
From playlist MegaFavNumbers
Multimeter review / buyers guide: UNI-T UT90A
This is a review of an entry level / basic multimeter for beginners...(or the advanced who have a soft spot for big clear LCD displays!!!). The UNI-T UT90A is a 2000 count, manual range selection digital multimeter. I also introduce the Fluke 28-II and the Fluke 381 AC DC Clamp Meter wit
From playlist Multimeter reviews, buyers guide and comparisons.
Risk Assessment: System characterization
http://trustedci.org/ Performing the system characterization in a cyber risk assessment.
From playlist Center for Applied Cybersecurity Research (CACR)
HOT AMD Mini PC? Minisforum UM690
We check out the hot Minisforum UM690 mini PC with the AMD Ryzen 9 6900HX to see if this has what it takes to beat the Beelink GTR6. STH Main Site Article: https://www.servethehome.com/minisforum-um690-review-an-amd-ryzen-9-6900hx-mini-pc/ STH Top 5 Weekly Newsletter: https://eepurl.com/d
From playlist STH Mini PC
Protecting Controlled Unclassified InformationCUI in Nonfederal Information Systems and Organization
Presenter: Chris Seiders, Security Analyst, University of Pittsburgh, Computing Services and Systems Development https://isc2pghchapter.org/ Description: NIST Special Publication 800-171 “Protecting Controlled Unclassified Information(CUI) in Nonfederal Information Systems and Organizati
From playlist Center for Applied Cybersecurity Research (CACR)
Gap Analysis for DFARS (The Cyber Underground)
Like what you see? Please give generously. http://www.thinktechhawaii.com and NIST 800-171 Compliance in Azure and Office 365 environments. The Federal Government and DoD contracting requirements for cybersecurity compliance The host for this episode is Dave Stevens. ThinkTech Hawaii
From playlist Center for Applied Cybersecurity Research (CACR)
i2ACT-800s - NIST 800-171 Assessment & Compliance Tool Overview
i2ACT-800s: (The "s" is for small business or subcontractor.) The i2ACT-800s is the "lite" version of our suite as it offers two baselines (the NIST 800-171 called for by DFARS 252.204-7012 & FAR15 a subset from 800-171 called for by FAR 52.204-21), addressing all 110 requirements. The 126
From playlist Center for Applied Cybersecurity Research (CACR)
2019 Cloud Strategy for Compliance: DFARS, NIST and ITAR Considerations - Part 2
Part 1: https://youtu.be/EFTpijs7zX0 AWS (1:50) // Google (6:10) // Microsoft 11:30 Many organizations are working through open issues in their Plan of Action & Milestones (POA&M) and closing out items with various security measures. Some are transitioning to cloud-based Infrastructure as
From playlist Center for Applied Cybersecurity Research (CACR)
Long Multiplication - 3 x 3 Example Set 2
In this video, we get more practice with 3 by 3 digit multiplication combinations
From playlist Arithmetic