This is a potential security issue, you are being redirected to http://nvd.nist.gov
Search & Statistics
CVSS V3 Calculator
CVSS V2 Calculator
Checklist (NCP) Repository
SCAP Validated Tools
Security Controls and Assessment Procedures for Federal Information Systems and Organizations
Revision 4 Statements
Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
Authorizes wireless access to the information system prior to allowing such connections.
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.
Related to: AC-2, AC-3, AC-17, AC-19, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, PL-4, SI-4