Version | Date | Finding Count (2) | ||
---|---|---|---|---|
6 | 2013-03-14 | CAT I (High): 0 | CAT II (Med): 1 | CAT III (Low): 1 |
STIG Description |
---|
This STIG contains the technical security controls for the operation of a RFID Workstation in the DoD environment. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-18625 | Medium | PDA and Smartphones that are connected to DoD Windows computers via a USB connection must be compliant with requirements. | PDAs with flash memory can introduce malware to a PC when they are connected for provisioning of the PDA or to transfer data between the PC and PDA, particularly if the PDA is seen by the PC as a... |
V-14034 | Low | If a wireless connection (e.g. WLAN, Bluetooth) is used between the RFID scanner and RFID workstation, security requirements must be followed. | Sensitive data stored on the RFID scanner and transmitted to the workstation could be compromised. |