AC-18(1)
AC-18(1): Authentication and Encryption
The information system protects wireless access to the system using authentication of [one or more of users/devices] and encryption.
Supplemental
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |