tailieunhanh - Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i

The sources of external threats are systems and users outside the cloud, including attackers from the Internet against VMware vCloud Director through its APIs, the Web Console (written using Adobe Flex), the vApp transfer service, and the virtual machine remote console. A remote user who has no access rights to the system can attempt to gain access as an authorized user. Authenticated users of those interfaces can also be considered to be the sources of external threats, as they may try to exploit vulnerabilities in the system not available to unauthenticated users. . | Special Publication 800-97 National Institute of Standards and Technology Technology Administration . Department of Commerce Establishing Wireless Robust Security Networks A Guide to IEEE Recommendations of the National Institute of Standards and Technology Sheila Frankel Bernard Eydt Les Owens Karen Scarfone NIST Special Publication 800-97 Establishing Wireless Robust Security Networks A Guide to IEEE Recommendations of the National Institute of Standards and Technology Sheila Frankel Bernard Eydt Les Owens Karen Scarfone C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg MD 20899-8930 February 2007 . Department of Commerce Carlos M. Gutierrez Secretary Technology Administration Robert C. Cresanti Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey .