NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
on Wednesday 21 February 2007 print the content item {PDF=create pdf file of the content item^plugin:content.65}
in NIST.gov Publications > Special Publications - SP 800 series

Special Publication 800-97 provides detailed information on the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area network (WLAN) security.

SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, provides detailed information on the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area network (WLAN) security. IEEE 802.11i provides security enhancements over the previous 802.11 security method, Wired Equivalent Privacy (WEP), which has several well-documented security deficiencies. IEEE 802.11i introduces a range of new security features that are designed to overcome the shortcomings of WEP. This document explains these security features and provides specific recommendations to ensure the security of the WLAN operating environment. It gives extensive guidance on protecting the confidentiality and integrity of WLAN communications, authenticating users and devices using several methods, and incorporating WLAN security considerations into each phase of the WLAN life cycle. The document complements, and does not replace, NIST SP 800-48, Wireless Network Security: 802.11, Bluetooth and Handheld Devices.

SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
URL: http://csrc.nist.gov/publications/nistpubs/#sp800-97


NIST Special Publication # 800-97


Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2012-5108 (chrome)
Race condition in Google Chrome before 22.0.1229.92 allows remote attackers to execute arbitrary cod ...
»CVE-2012-5121 (chrome)
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a ...
»CVE-2012-5122 (chrome)
Google Chrome before 23.0.1271.64 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-5123 (chrome)
Skia, as used in Google Chrome before 23.0.1271.64, allows remote attackers to cause a denial of ser ...
»CVE-2012-5124 (chrome)
Google Chrome before 23.0.1271.64 does not properly handle textures, which allows remote attackers t ...
»CVE-2012-5126 (chrome)
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a ...
»CVE-2012-5127 (chrome)
Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of s ...
»CVE-2012-5130 (chrome, opensuse)
Skia, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of ser ...
»CVE-2012-5136 (chrome, opensuse)
Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-5137 (chrome, opensuse)
Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a ...
»CVE-2012-5138 (chrome, opensuse)
Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact ...
»CVE-2016-0248 (security_guardium)
IBM Security Guardium 9.0 before p700 and 10.0 before p100 allows man-in-the-middle attackers to obt ...
»CVE-2016-0379 (websphere_mq)
IBM WebSphere MQ 7.5 before 7.5.0.7 and 8.0 before 8.0.0.5 mishandles protocol flows, which allows r ...
»CVE-2016-0918 (rsa_identity_management_and_governance, rsa_via_lifecycle_and_governance)
EMC RSA Identity Management and Governance before 6.8.1 P25 and 6.9.x before 6.9.1 P15 and RSA Via L ...
»CVE-2016-2776 (bind)
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc ...


Date published: 2016-09-29T04:50:07Z
Details

»Cisco Releases Security Updates
Original release date: September 28, 2016 Cisco has released security updates to address vuln ...
»ISC Releases Security Updates for BIND
Original release date: September 27, 2016 The Internet Systems Consortium (ISC) has released ...
»OpenSSL Releases Security Updates
Original release date: September 23, 2016 | Last revised: September 26, 2016 OpenSSL has rele ...
»FTC Releases Data Breach Recovery and Prevention Video
Original release date: September 22, 2016 The Federal Trade Commission (FTC) has released a s ...
»Drupal Releases Security Advisory
Original release date: September 21, 2016 Drupal has released an advisory to address vulnerab ...
»Cisco Releases Security Updates
Original release date: September 21, 2016 Cisco has released security updates to address vuln ...
»Mozilla Releases Security Updates
Original release date: September 20, 2016 Mozilla has released security updates to address mu ...
»Apple Releases Security Updates
Original release date: September 20, 2016 Apple has released security updates to address vuln ...
»Cisco Releases Security Updates
Original release date: September 16, 2016 Cisco has released security updates to address a vu ...
»VMWare Releases Security Updates
Original release date: September 16, 2016 VMware has released a security update to address vu ...


Date published: not known
Details

»“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker
An interview with VB2016’s keynote speaker Christine Whalley - Dire ...
»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...
»GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
Next month at VB2016, HPE Security's Oleg Petrovsky will speak abou ...
»BSides Denver: Join and Support the Security Community
If you are coming to VB2016 in Denver, why not spend an extra day i ...
»VB2016 'Last-Minute' Papers Announced
We are excited to announce the addition of the "last-minute ...
»VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka
In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi T ...
»Paper: Behavioural Detection and Prevention of Malware on OS X
In a new paper published through Virus Bulletin, Vincent Van Mieghe ...
»VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!
At VB2016, four researcher from Bitdefender will present a paper in ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Cisco Releases Security Updates
[28 Sep 2016 07:00pm]

» ISC Releases Security Updates for BIND
[27 Sep 2016 02:31pm]

» OpenSSL Releases Security Updates
[23 Sep 2016 01:13pm]

» FTC Releases Data Breach Recovery and Prevention Video
[22 Sep 2016 11:21am]

» Drupal Releases Security Advisory
[21 Sep 2016 06:49pm]

» Cisco Releases Security Updates
[21 Sep 2016 06:36pm]

» Mozilla Releases Security Updates
[20 Sep 2016 03:02pm]

» Apple Releases Security Updates
[20 Sep 2016 01:56pm]

» Cisco Releases Security Updates
[16 Sep 2016 07:31pm]

» VMWare Releases Security Updates
[16 Sep 2016 02:17am]

***
US-CERT Alerts

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

***
Computerworld Security

» Israeli startup says its new software would have prevented Tesla hack
[29 Sep 2016 12:52pm]

» Investigating Cybersecurity Incidents — a free course
[29 Sep 2016 12:43pm]

» 10 ways to secure a mobile workforce
[29 Sep 2016 06:56am]

» Why employees are still a security risk
[29 Sep 2016 06:00am]

» FBI reports more attempts to hack voter registration system
[29 Sep 2016 05:13am]

» Yahoo hackers weren't state-sponsored, a security firm says
[29 Sep 2016 04:30am]

» Cops run unauthorized searches on confidential databases for revenge, stalking
[28 Sep 2016 11:52am]

» Meet Apache Spot, a new open-source project for cybersecurity
[28 Sep 2016 11:36am]

» Analysts laud and lance new Microsoft browser armor
[27 Sep 2016 02:10pm]

» Six senators demand more details about the Yahoo data breach
[27 Sep 2016 12:45pm]

» Swift CEO details three more failed attacks on banking network
[27 Sep 2016 09:23am]

» Your users have porous passwords? Blame yourself, IT.
[27 Sep 2016 05:00am]

» Yahoo's claim of 'state-sponsored' hackers meets with skepticism
[27 Sep 2016 04:34am]

» 34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert
[26 Sep 2016 03:05pm]

» New Mac Trojan uses the Russian space program as a front
[26 Sep 2016 02:58pm]

***
Microsoft Security Advisories

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» Time to Kill Security Questions—or Answer Them With Lies
[28 Sep 2016 05:00am]

» Tesla Responds to Chinese Hack With a Major Security Upgrade
[27 Sep 2016 05:00am]

» Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes
[24 Sep 2016 05:00am]

» Our Favorite Hacker Moments From Mr. Robot Season 2
[22 Sep 2016 12:18pm]

» Hack Brief: Yahoo Breach Hits Half a Billion Users
[22 Sep 2016 10:15am]

» Officials Are Scrambling to Protect the Election From Hackers
[21 Sep 2016 05:00am]

» Cloudflare Launches a Three-Pronged Attack to Encrypt the Entire Web
[20 Sep 2016 07:43am]

» How Police Trace Cellphones in IEDs Like the Ones in NYC
[19 Sep 2016 01:56pm]

» Inside Google’s Internet Justice League and Its AI-Powered War on Trolls
[19 Sep 2016 04:55am]

» Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden
[17 Sep 2016 05:00am]

***
Network World Security

» Bounty for iOS jailbreak exploit jumps to $1.5 million
[29 Sep 2016 02:33pm]

» Microsoft opens up its 'million dollar' bug-finder
[29 Sep 2016 11:42am]

» IDG Contributor Network: Passwords will be wirelessly transmitted through bodies
[29 Sep 2016 10:00am]

» IDG Contributor Network: The future of security: A combination of cyber and physical defense
[29 Sep 2016 07:48am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Review: Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» Microsoft opens up its 'million dollar' bug-finder
[29 Sep 2016 11:42am]

» Why employees are still a security risk
[29 Sep 2016 06:00am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}