Version | Date | Finding Count (2) | ||
---|---|---|---|---|
6 | 2011-10-07 | CAT I (High): 0 | CAT II (Med): 2 | CAT III (Low): 0 |
STIG Description |
---|
This STIG contains the technical security controls for the operation of a Wireless Keyboard & Mouse in the DoD environment. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-7073 | Medium | If infrared wireless mice and keyboards are used on classified or unclassified equipment and networks, the required conditions must be followed. | Wireless mice and keyboard receivers are a open wireless port on a PC, which can be attacked by a hacker. In addition, wireless keyboard transmissions, if not secured, can be compromised when intercepted. |
V-4639 | Medium | If a wireless keyboard or mouse is used with any site computers, then it must follow security requirements. | The use of unauthorized wireless keyboards and mice can compromise DoD computers, networks, and data. The receiver for a wireless keyboard/mouse provides a wireless port on the computer that... |