NIST SP 800-53 r4 Security Control SC-40 (3): Imitative or Manipulative Communications Deception, v4

Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (3): Imitative or Manipulative Communications Deception.
Identifier https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-40-_3__-imitative-or-manipulative-communications-deception/4/
Publication Date 2021-04-26
Issuing Organization
Trustmark Support help@trustmarkinitiative.org 555-555-5555 No Mailing Address
Keywords 800-53, Communications Protection, Imitative, Manipulative Communications Deception, NIST, Security, System
Legal Notice This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
Loading...

Trust Expression:

TD_ref1

References (1)

 TD  Wireless Link Protection | Imitative Or Manipulative Communications Deception, v1.0
Description Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
ID TD_ref1
Provider Reference

Sources (1)

SP800-53R4 NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at http://dx.doi.org/10.6028/NIST.SP.800-53r4.
Also available as XML or JSON