94%(31)29 out of 31 people found this document helpful
This preview shows page 15 out of 15 pages.
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Retrieved from: -martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdfNational Institute of Standards and Technology (NIST). (2001). Security Requirements for Cryptographic Modules.Retrieved from: -module-validation-program/standardsPinola, M. (2018). Features and Uses of an Ad Hoc Wireless Network.Retrieved from: Ray, B. (2017). What are ZigBee, WiFi, Bluetooth, BLE, and WiMax?Retrieved from: Wireless security protocols: The difference between WEP, WPA, WPA2. Retrieved from: -encryption-basics-Understanding-WEP-WPA-and-WPA2Souppaya, M. Scarfone, K. (2012). National Institute of Standards and Technology (NIST). Guidelines for Securing Wireless Local Area Networks (WLANs). Special Publication 800-153. Retrieved from: