Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO

REQ.252 Configure key encryption

This document details the security guidelines or requirements related to key protection of wireless networks in any organization or company. In this case, it is recommended that the use of WPA2 Personal or WPA2 Enterprise key encryption methods be preferred.

Requirement

The organization must prefer the use of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods.


Service status - Terms of Use