AC-18 (1)
AC-18 (1): Authentication And Encryption
The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
Supplemental
None
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
Privacy (High), Privacy (Low), Privacy (Mod) |