http://radar.oreilly.com/2011/05/nstic-analysis-identity-pri...
https://www.nist.gov/itl/applied-cybersecurity/tig