ISM-0537

History

2008
Agencies should address the following vulnerabilities if they choose to use wireless communications for the transmission of classified information: a. man-in-the-middle and rogue AP attacks b. weak cryptography c. unauthenticated system users brute-forcing authentication d. availability requirements.