The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|A Comparison of Averted and Completed School Attacks from the Police Foundation Averted School Violence Database||
The Police Foundation, in collaboration with the COPS Office, implemented the Averted School Violence (ASV) database to provide a platform for sharing information about averted incidents of violence in institutions of elementary, secondary, and higher education. As a companion to the preliminary report on the ASV database (Daniels 2018), this report compares 51 completed with 51 averted incidents of school violence from the ASV database and analyzes both sets. It includes findings on the demographics of individuals who plan attacks, victims' demographics in completed attacks, and community characteristics; it also provides important recommendations to minimize school violence and improve student and school safety.
|School Security||Security||February 2019|
|Platform Firmware Resiliency Guidelines (NIST.SP.800-193)||
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The platform is a collection of fundamental hardware and firmware components needed to boot and operate a system. The technical guidelines in this document promote resiliency in the platform by describing security mechanisms for protecting the platform against unauthorized changes, detecting unauthorized changes that occur, and recovering from attacks rapidly and securely.
|Platform Firmware||Security||May 2018|
|Quick Start Guide for Populating Mobile Test Devices||
This guide describes how to populate a mobile device as part of testing a mobile forensic tool. It was built to be used with Federated Testing, but can also be used to populate a device for use with other test approaches. The Federated Testing project is an expansion of the Computer Forensics Tool Testing (CFTT) Program at NIST which provides digital forensics investigators and labs with test materials for forensic tool testing. The goal of Federated Testing is to help digital forensics investigators to test the tools that they use in their labs and to enable sharing of tool test results within the digital forensics community. The goals of this guide are twofold: 1) provide guidance for how to populate (place test data on) a moblie device for use in forensic tool testing and 2) provide guidance to select data elements for inclusion that ensure effective testing.
|Mobile Forensics||Mobile/Portable Computing||May 2018|
|DHS Cybersecurity Strategy||
This strategy provides the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.
|Framework for Improving Critical Infrastructure Cybersecurity version 1.1||
Version 1.1 of this Cybersecurity Framework refines, clarifies, and enhances Version 1.0, which was issued in February 2014. It incorporates comments received on the two drafts of Version 1.1. Version 1.1 is intended to be implemented by first-time and current Framework users. Current users should be able to implement Version 1.1 with minimal or no disruption; compatibility with Version 1.0 has been an explicit objective.
|Cyber Security||Security||April 2018|
|Fog Computing Conceptual Model||
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is to decentralize applications, management, and data analytics into the network itself using a distributed and federated compute model. This approach has become known as fog computing. This document presents the conceptual model of fog and mist computing and how they relate to cloud-based computing models for IoT. This document further characterizes important properties and aspects of fog computing, including service models, deployment strategies, and provides a baseline of what fog computing is, and how it may be used.
|Cloud Computing||Data Management, Communications||March 2018|
|DHS S&T Cyber Security Division 2018 Portfolio Guide||
The DHS Science & Technology, Cyber Security Division, 2018 Portfolio Guide presents in-depth summaries of S&T’s various cybersecurity R&D program areas—from Cyber for Critical Infrastructure to Cyber Physical System Security. In all, the guide delivers 15 insightful overviews—including one about the DHS Silicon Valley Innovation Program—encompassing the totality of S&T’s broad cybersecurity research portfolio.
|Cyber Security||Security||March 2018|
|DHS S&T Cyber Security Division Technology Guide 2018||
The DHS Science & Technology (S&T) Cyber Security Division, Technology Guide focuses on individual S&T research efforts to provide stakeholders an insider’s look at more than 70 mature, S&T-funded R&D technologies and solutions plus Transition to Practice technologies that are ready for adoption and marketplace transition. The technologies presented are from research project areas such as Software Assurance, Mobile Security, Identity Management, Distributed Denial of Service Defense, Data Privacy, Cyber Competitions, Cyber Forensics and more.
|Cyber Security||Security||March 2018|
|National Association of State Budget Officers (NASBO) Spring 2017 Fiscal Survey of States||
The Fiscal Survey of States is published twice annually by the National Association of State Budget Officers (NASBO). The survey presents aggregate and individual data on the states' general fund receipts, expenditures, and balances. These general funds are used to finance most broad-based state services and are the most important elements in determining the fiscal health of the states.
|State Budgets||Uncategorized||July 2017|
|Challenges & Trends in Public Sector IT Operations: United States||
Public sector organizations are feeling the pains of digital transformation. Faced with modernization, data center upgrades and continuous cloud-first initiatives, this transformation of the IT environment is making it a challenge to deliver services, comply with service level agreements (SLAs), meet citizens’ expectations and achieve organizational missions.
Challenges & Trends in Public Sector IT Operations: the United States, a research study conducted by the Ponemon Institute and sponsored by Splunk of 1,227 decision makers and operations staff across federal, state and local governments, higher education and federal systems integrators and aerospace and defense industries, reveals that digital transformation is well underway with budgets shifting from traditional on premise investments to more cloud and agile development paradigms.
|Public Sector IT Operations||Uncategorized||July 2017|