AC-18(1)
AC-18(1): Authentication and Encryption
The information system protects wireless access to the system using authentication of [one or more of "users"/"devices"] and encryption.
Supplemental
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |