Sha256: ac746a057bf1fd1f62f7ff780d2fce90326aa6f4b8a4b7aa0924a7bda2161bdc
Contents?: true
Size: 1.38 KB
Versions: 2
Compression:
Stored size: 1.38 KB
Contents
{ "name": "stig_wireless_keyboard_and_mouse", "date": "2014-03-18", "description": "This STIG contains the technical security controls for the operation of a Wireless Keyboard & Mouse in the DoD environment.", "title": "Wireless Keyboard and Mouse Security Technical Implementation Guide (STIG)", "version": "6", "item_syntax": "^\\w-\\d+$", "section_separator": null, "items": [ { "id": "V-4639", "title": "If a wireless keyboard or mouse is used with any site computers, then it must follow security requirements.", "description": "The use of unauthorized wireless keyboards and mice can compromise DoD computers, networks, and data. The receiver for a wireless keyboard/mouse provides a wireless port on the computer that could be attacked by a hacker. Wireless keyboard transmissions can be intercepted by a hacker and easily viewed if required security is not used.", "severity": "medium" }, { "id": "V-7073", "title": "If infrared wireless mice and keyboards are used on classified or unclassified equipment and networks, the required conditions must be followed.\n\n", "description": "Wireless mice and keyboard receivers are a open wireless port on a PC, which can be attacked by a hacker. In addition, wireless keyboard transmissions, if not secured, can be compromised when intercepted.", "severity": "medium" } ] }
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
kriterion-0.1.0 | standards/stig_wireless_keyboard_and_mouse.json |
kriterion-0.0.1 | standards/stig_wireless_keyboard_and_mouse.json |