|

 
|
| | Name : | Matthew Beaumont-Gay | Organization : | Harvey Mudd College | Post Date : | 7/7/2005 |
| Section : | 6.6 | Page no. : | | Line no.: | | Comment : | While I applaud the requirements in section 6.7.2.1 (requiring documentation and verification of wireless communication capabilities), I believe that section 6.6 should have a similar subsection. As a network security researcher, I am well aware that wired networks are not much less vulnerable to eavesdropping and data injection than are wireless networks. Cryptographic techniques used for wired communication should be just as well documented (and reviewed, as in section 6.7.2.1.3) as those used for wireless communication. | |
|
|