Sha256: ac746a057bf1fd1f62f7ff780d2fce90326aa6f4b8a4b7aa0924a7bda2161bdc

Contents?: true

Size: 1.38 KB

Versions: 2

Compression:

Stored size: 1.38 KB

Contents

{
  "name": "stig_wireless_keyboard_and_mouse",
  "date": "2014-03-18",
  "description": "This STIG contains the technical security controls for the operation of a Wireless Keyboard & Mouse in the DoD environment.",
  "title": "Wireless Keyboard  and Mouse Security Technical Implementation Guide (STIG)",
  "version": "6",
  "item_syntax": "^\\w-\\d+$",
  "section_separator": null,
  "items": [
    {
      "id": "V-4639",
      "title": "If a wireless keyboard or mouse is used with any site computers, then it must follow security requirements.",
      "description": "The use of unauthorized wireless keyboards and mice can compromise DoD computers, networks, and data.  The receiver for a wireless keyboard/mouse provides a wireless port on the computer that could be attacked by a hacker.  Wireless keyboard transmissions can be intercepted by a hacker and easily viewed if required security is not used.",
      "severity": "medium"
    },
    {
      "id": "V-7073",
      "title": "If infrared wireless mice and keyboards are used on classified or unclassified equipment and networks, the required conditions must be followed.\n\n",
      "description": "Wireless mice and keyboard receivers are a open wireless port on a PC, which can be attacked by a hacker.  In addition, wireless keyboard transmissions, if not secured, can be compromised when intercepted.",
      "severity": "medium"
    }
  ]
}

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
kriterion-0.1.0 standards/stig_wireless_keyboard_and_mouse.json
kriterion-0.0.1 standards/stig_wireless_keyboard_and_mouse.json