The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.
See an example process description from task's page
Connected other frameworks and requirements:
13.1.2: Security of network services
I05: Langattomat verkot
PR.PT-4: Communications and control networks
8.21: Security of network services
No items found.
Subscribe to Academy today
Elevate Your Knowledge with Exclusive Access to Weekly Webinars, Video Courses, Help Articles, and Blogs.
Kiitos! Saat jatkossa uutiskirjeen sähköpostiisi joka perjantai.