微信扫一扫联系客服

微信扫描二维码

进入报告厅H5

关注报告厅公众号

261

NSA指南《在公共环境中保护无线设备》.PDF

# 公共环境 # 无线设备 大小:0.49M | 页数:8 | 上架时间:2021-08-05 | 语言:英文

NSA指南《在公共环境中保护无线设备》.PDF

NSA指南《在公共环境中保护无线设备》.PDF

试看4页

类型: 专题

上传者: FF

撰写机构: NSA

出版日期: 2021-08-02

摘要:

Telework has become an essential component of business, and many people are teleworking from home or during travel. While the owners of home networks can take steps to secure those networks, it can be difficult to ensure public networks (e.g., conference or hotel Wi-Fi®) are secure. Protecting personal and corporate data is essential at all times, but especially when teleworking in public settings. To ensure data, devices, and login credentials remain secure and uncompromised, cybersecurity is a crucial priority for users and businesses. This includes identifying higher-risk public networks and implementing security best practices while in public settings, whether connecting laptops, tablets, mobile phones, wearable accessories, or other devices with the ability to connect to the internet. 

Accessing public Wi-Fi hotspots may be convenient to catch up on work or check email, but public Wi-Fi is often not configured securely. Using these networks may make users’ data and devices more vulnerable to compromise, as cyber actors employ malicious access points (Masquerading [T1036]1), redirect to malicious websites, inject malicious proxies, and eavesdrop on network traffic (Network Sniffing [T1040]).[1] In addition to Wi-Fi, cyber actors can compromise other common wireless technologies, such as Bluetooth® and Near Field Communications (NFC) (Exploit via Radio Interfaces 

[T1477]). These technologies must be properly configured to ensure user devices remain secure from compromises. The risk is not merely theoretical; these malicious techniques are publicly known and in use.

This infosheet gives National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) users the best practices for securing devices when conducting business in public settings. It describes how to identify potentially vulnerable connections and protect common wireless technologies, and lists steps users can take to help secure their devices and data. While these best practices cannot ensure data and devices are fully protected, they do provide protective measures users can employ to improve their cybersecurity and reduce their risks.  

展开>> 收起<<

请登录,再发表你的看法

登录/注册

FF

相关报告

更多

浏览量

(176)

下载

(4)

收藏

分享

购买

5积分

0积分

原价5积分

VIP

*

投诉主题:

  • 下载 下架函

*

描述:

*

图片:

上传图片

上传图片

最多上传2张图片

提示

取消 确定

提示

取消 确定

提示

取消 确定

积分充值

选择充值金额:

30积分

6.00元

90积分

18.00元

150+8积分

30.00元

340+20积分

68.00元

640+50积分

128.00元

990+70积分

198.00元

1640+140积分

328.00元

微信支付

余额支付

积分充值

填写信息

姓名*

邮箱*

姓名*

邮箱*

注:填写完信息后,该报告便可下载

选择下载内容

全选

取消全选

已选 1