Sichere Nutzung von WLAN (ISi-WLAN) - Bundesamt für Sicherheit ...
Sichere Nutzung von WLAN (ISi-WLAN) - Bundesamt für Sicherheit ...
Sichere Nutzung von WLAN (ISi-WLAN) - Bundesamt für Sicherheit ...
Erfolgreiche ePaper selbst erstellen
Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.
<strong>ISi</strong>-Reihe <strong>Sichere</strong> <strong>Nutzung</strong> <strong>von</strong> <strong>WLAN</strong> (<strong>ISi</strong>-<strong>WLAN</strong>)<br />
TLS (Transport Layer Security)..........................................................................5, 9, 10, 13, 19, 21<br />
RADIUS (Remote Authentication Dial-In User Service)....................................................................9<br />
Schwachstelle...............................................................................................................8, 10, 13, 18, 20<br />
<strong>Sicherheit</strong>skonzept..........................................................................................................................5, 21<br />
Spam.............................................................................................................................................11, 21<br />
SSL (Secure Sockets Layer)...............................................................................................9, 10, 19, 21<br />
TKIP (Temporal Key Integrity Protocol)...................................................................................7, 8, 13<br />
TLS (Transport Layer Security)...............................................................................5, 9, 10, 13, 19, 21<br />
TR (Technische Richtlinie)......................................................................................................5, 16, 26<br />
USB (Universal Serial Bus)..........................................................................................................11, 14<br />
Vertraulichkeit........................................................................................................5, 10, 15, 19, 20, 22<br />
Virenschutzprogramm..................................................................................................................14, 22<br />
Virus.......................................................................................................................................14, 18, 22<br />
VPN (Virtual Private Network)..................................................................3, 5, 6, 9, 10, 14, 15, 22, 26<br />
Web-Anwendung................................................................................................................................14<br />
WEP (Wired Equivalent Privacy)....................................................................................6-9, 11-13, 26<br />
<strong>WLAN</strong> (Wireless Local Area Network).....................................................................1, 3, 5-16, 22, 26<br />
WPA (WiFi Protected Access)........................................................................................5-9, 11-13, 26<br />
WPA2 (WiFi Protected Access 2)...............................................................................5, 7-9, 12, 13, 15<br />
Zertifikat.............................................................................................................................................13<br />
24 <strong>Bundesamt</strong> <strong>für</strong> <strong>Sicherheit</strong> in der Informationstechnik