Wireless Access

Wireless access allows for non-wired connectivity to the Internet via a computer, mobile or electronic device. The following provides resources for implementing and assessing the security of enterprise wireless access. Implementation Assessment Aruba Networks –...

Physical Protections

One of the most important, but overlooked part of security by organizations is physical security. Maintaining strong physical security is necessary to ensure your assets and data remain safe and secure. Implementation Assessment Cybersecurity & Infrastructure...

Authentication/Passwords

Authentication is verifying that an individual is who they claim to be. Authentication is typically performed by presenting a username (ID) and at least one private item that only the individual should know, most commonly, a password. The major concern when using...

Mobile Devices

Mobile device features are constantly changing, so it is difficult to define the term “mobile device”. However, as features change, so do threats and security controls, so it is important to establish a baseline of mobile device features. NIST provides the following...

Authorized Users

Authorization is the mechanism to determine access levels or privileges related to information system resources including files, services, programs, data and applications. Implementation Assessment Boston University – Identity and Access Management PolicyA...