NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
on Wednesday 21 February 2007 print the content item {PDF=create pdf file of the content item^plugin:content.65}
in NIST.gov Publications > Special Publications - SP 800 series

Special Publication 800-97 provides detailed information on the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area network (WLAN) security.

SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, provides detailed information on the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area network (WLAN) security. IEEE 802.11i provides security enhancements over the previous 802.11 security method, Wired Equivalent Privacy (WEP), which has several well-documented security deficiencies. IEEE 802.11i introduces a range of new security features that are designed to overcome the shortcomings of WEP. This document explains these security features and provides specific recommendations to ensure the security of the WLAN operating environment. It gives extensive guidance on protecting the confidentiality and integrity of WLAN communications, authenticating users and devices using several methods, and incorporating WLAN security considerations into each phase of the WLAN life cycle. The document complements, and does not replace, NIST SP 800-48, Wireless Network Security: 802.11, Bluetooth and Handheld Devices.

SP 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
URL: http://csrc.nist.gov/publications/nistpubs/#sp800-97


NIST Special Publication # 800-97


Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2015-6289 (ios)
Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attac ...
»CVE-2016-0914 (documentum_administrator, documentum_capital_projects, documentum_taskspace, documentum_webtop)
EMC Documentum WebTop 6.8 before Patch 13 and 6.8.1 before Patch 02, Documentum Administrator 7.x be ...
»CVE-2016-1428 (ios_xe)
Double free vulnerability in Cisco IOS XE 3.15S, 3.16S, and 3.17S allows remote authenticated users ...
»CVE-2016-1434 (ip_phone_8800_series_firmware)
The license-certificate upload functionality on Cisco 8800 phones with software 11.0(1) allows remot ...
»CVE-2016-1435 (ip_phone_8800_series_firmware)
Cisco 8800 phones with software 11.0(1) do not properly enforce mounted-filesystem permissions, whic ...
»CVE-2016-1436 (asr_5000_software)
The General Packet Radio Switching Tunneling Protocol 1 (aka GTPv1) implementation on Cisco ASR 5000 ...
»CVE-2016-1437 (prime_collaboration_deployment)
SQL injection vulnerability in the SQL database in Cisco Prime Collaboration Deployment before 11.5. ...
»CVE-2016-1438 (asyncos)
Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass ...
»CVE-2016-1439 (unified_contact_center_enterprise)
Cross-site scripting (XSS) vulnerability in the management interface in Cisco Unified Contact Center ...
»CVE-2016-4519
Stack-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.30 allows remote attackers t ...
»CVE-2016-4525
Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated u ...
»CVE-2016-4528
Buffer overflow in Advantech WebAccess before 8.1_20160519 allows local users to cause a denial of s ...
»CVE-2016-4802
Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SS ...
»CVE-2016-5021
The iControl REST service in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM ...
»CVE-2016-5435
Memory leak in Huawei IPS Module, NGFW Module, NIP6300, NIP6600, and Secospace USG6300, USG6500, USG ...


Date published: 2016-06-25T04:50:00Z
Details

»IRS Announces Safeguards to Protect Taxpayer Information
Original release date: June 24, 2016 The Internal Revenue Service (IRS) has issued two news r ...
»WordPress Releases Security Update
Original release date: June 22, 2016 WordPress 4.5.2 and prior versions are affected by sever ...
»Apple Releases Security Update
Original release date: June 21, 2016 Apple has released a security update to address a vulner ...
»Google Releases Security Update for Chrome
Original release date: June 17, 2016 Google has released Chrome version 51.0.2704.103 to addr ...
»Adobe Releases Security Updates
Original release date: June 16, 2016 Adobe has released security updates to address vulnerabi ...
»Cisco Releases Security Updates
Original release date: June 15, 2016 Cisco has released security updates to address vulnerabi ...
»VMware Releases Security Updates
Original release date: June 15, 2016 VMware has released security updates to address a vulner ...
»Microsoft Releases June 2016 Security Bulletin
Original release date: June 14, 2016 Microsoft has released 16 updates to address vulnerabili ...
»Adobe Releases Security Updates
Original release date: June 14, 2016 Adobe has released security updates to address vulnerabi ...
»VMware Releases Security Updates
Original release date: June 10, 2016 VMware has released security updates to address vulnerab ...


Date published: not known
Details

»VB2015 paper: DDoS Trojan: A Malicious Concept that Conquered the ELF Format
In their VB2015 paper, Peter Kálnai and Jaromír Hořejší look at the ...
»Throwback Thursday: Hyppönen, that Data Fellow / Finnish Sprayer
This week, well known and universally respected industry guru Mikko ...
»VB2015 paper: Economic Sanctions on Malware
Financial pressure can be a proactive and potentially very effectiv ...
»Virus Bulletin's job site for recruiters and job seekers
Virus Bulletin has relaunched its security job vacancy service and ...
»Throwback Thursday: One_Half: The Lieutenant Commander?
In October 1994, a new multi-partite virus appeared, using some of ...
»Advertisements on Blogspot sites lead to support scam
Support scam pop-ups presented through malicious advertisements sho ...
»To make Tor work better on the web, we need to be honest about it
Many websites put barriers in front of visitors who use the Tor net ...
»Paper: How It Works: Steganography Hides Malware in Image Files
A new paper by CYREN researcher Lordian Mosuela takes a close look ...
»Paying a malware ransom is bad, but telling people to never do it is unhelpful advice
The current ransomware plague is one of the worst threats the Inter ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» IRS Announces Safeguards to Protect Taxpayer Information
[24 Jun 2016 05:02pm]

» WordPress Releases Security Update
[22 Jun 2016 06:42am]

» Apple Releases Security Update
[21 Jun 2016 06:56am]

» Google Releases Security Update for Chrome
[16 Jun 2016 11:32pm]

» Adobe Releases Security Updates
[16 Jun 2016 07:55pm]

» Cisco Releases Security Updates
[15 Jun 2016 06:32pm]

» VMware Releases Security Updates
[15 Jun 2016 10:40am]

» Microsoft Releases June 2016 Security Bulletin
[14 Jun 2016 11:38am]

» Adobe Releases Security Updates
[14 Jun 2016 11:08am]

» VMware Releases Security Updates
[10 Jun 2016 11:37am]

***
US-CERT Alerts

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

» TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities
[14 Jul 2015 05:13pm]

***
Computerworld Security

» The EU and U.S. reach data-transfer deal, report says
[24 Jun 2016 09:45am]

» Lenovo patches two high-severity flaws in PC support tool
[24 Jun 2016 08:18am]

» U.S. court rules that FBI can hack into a computer without a warrant
[24 Jun 2016 04:36am]

» Lessons and observations from the GoToMyPC incident
[23 Jun 2016 10:06pm]

» Why Russian hackers were likely behind the DNC breach
[23 Jun 2016 02:31pm]

» GozNym Trojan targets business accounts at major U.S. banks
[23 Jun 2016 12:58pm]

» AWS and Azure clouds gain security OK from feds
[23 Jun 2016 09:38am]

» BlackBerry goes into the red as revenue drops by a third
[23 Jun 2016 09:24am]

» The number of corporate users hit by crypto ransomware is skyrocketing
[23 Jun 2016 09:18am]

» A look inside the Microsoft Local Administrator Password Solution
[23 Jun 2016 04:00am]

» Mobile advertiser tracked users' locations without their consent, FTC alleges
[22 Jun 2016 12:49pm]

» Think tanks mull Geneva Convention for cybercrime
[22 Jun 2016 11:12am]

» Severe flaws in widely used archive library put many projects at risk
[22 Jun 2016 08:02am]

» Google concerned about curious but destructive cleaning robots that hack reward systems
[22 Jun 2016 07:53am]

» Microsoft invokes Supreme Court opinion in Ireland email case
[22 Jun 2016 03:41am]

***
Microsoft Security Advisories

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 11:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 11:00am]

» 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0
[13 Oct 2015 11:00am]

***
WIRED

» A Bug in Chrome Makes It Easy to Pirate Movies
[24 Jun 2016 05:00am]

» Hey, Congress, Here’s How You Use Periscope
[22 Jun 2016 02:52pm]

» House Dems Take to Twitter to Let You See Their Gun-Control Sit-In
[22 Jun 2016 11:08am]

» After Orlando, the Homemade AR-15 Industry Surges
[22 Jun 2016 05:00am]

» Security News This Week: Anonymous Hacks ISIS Twitter With Gay Pride
[19 Jun 2016 05:00am]

» Silk Road Prosecutors Argue Ross Ulbricht Doesn’t Deserve a New Trial
[18 Jun 2016 03:53pm]

» Orlando Shows the Limits of Facebook’s Terror Policing
[17 Jun 2016 06:38am]

» How Does the FBI Watch List Work? And Could It Have Prevented Orlando?
[17 Jun 2016 05:00am]

» Apple’s Big Security Upgrades Will Save You From Yourself
[16 Jun 2016 12:10pm]

» A Chaotic Whodunnit Follows the DNC’s Trump Research Hack
[15 Jun 2016 08:33pm]

***
Network World Security

» Researchers steal data from a PC by controllng the noise from the fans
[24 Jun 2016 12:58pm]

» The EU and US reportedly reach data-transfer deal
[24 Jun 2016 09:15am]

» Demisto accelerates security investigations through automation and collaboration  
[24 Jun 2016 08:29am]

» Lenovo patches two high severity flaws in PC support tool
[24 Jun 2016 07:40am]

» Buyer’s Guide to 9 multi-factor authentication products
[06 Jun 2016 04:00am]

» 5 trends shaking up multi-factor authentication
[06 Jun 2016 04:00am]

» 9-vendor authentication roundup: The good, the bad and the ugly
[06 Jun 2016 04:00am]

» Review: Hot new tools to fight insider threats
[31 May 2016 04:00am]

» 3 top tools to fight insider threats
[31 May 2016 04:00am]

» SIEM review: Splunk, ArcSight, LogRhythm and QRadar
[09 May 2016 02:00pm]

» What users love (and hate) about 4 leading firewall solutions
[25 Apr 2016 01:48pm]

» 10 no-cost home security mobile apps worth a download
[01 Apr 2016 06:39am]

» 7 VPN services for hotspot protection
[14 Mar 2016 04:00am]

» The EU and US reportedly reach data-transfer deal
[24 Jun 2016 09:15am]

» Lenovo patches two high severity flaws in PC support tool
[24 Jun 2016 07:40am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}