Date Published: November 2002
Author(s)
Tom Karygiannis (NIST), Les Owens (BAH)
The purpose of this document is to provide agencies with guidance for establishing secure wireless networks. Agencies are encouraged to tailor the recommended guidelines and solutions to meet their specific security or business requirements. However, NIST recommendations are not intended to supersede an agency's existing security policy. The document addresses two wireless technologies that government agencies are most likely to employ: wireless local area networks (WLAN) and ad hoc or, more specifically, Bluetooth networks. The document also addresses the use of wireless handheld devices. The document does not address technologies such as wireless radio and other WLAN standards that are not designed to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. These technologies are considered out of the scope of this document.
The purpose of this document is to provide agencies with guidance for establishing secure wireless networks. Agencies are encouraged to tailor the recommended guidelines and solutions to meet their specific security or business requirements. However, NIST recommendations are not intended to...
See full abstract
The purpose of this document is to provide agencies with guidance for establishing secure wireless networks. Agencies are encouraged to tailor the recommended guidelines and solutions to meet their specific security or business requirements. However, NIST recommendations are not intended to supersede an agency's existing security policy. The document addresses two wireless technologies that government agencies are most likely to employ: wireless local area networks (WLAN) and ad hoc or, more specifically, Bluetooth networks. The document also addresses the use of wireless handheld devices. The document does not address technologies such as wireless radio and other WLAN standards that are not designed to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. These technologies are considered out of the scope of this document.
Hide full abstract
Keywords
Bluetooth; IEEE 802.11; network security; threats; vulnerabilities; wireless local area network; wireless networking
Control Families
None selected