*Interface implements radio control and encryption
* Professional administration
* UC-WL-2 Wireless stationary home IoT device
@@ -1701,6 +1701,18 @@ Type: Affects likelihood of all attacks.
***[COM-L-2]** Product implements encryption functions on interface
***[COM-L-3]** Product implements RTOS managing radio, PXE boot, remote management, or similar
**[LIS]** Ease of reading from transmission media of directly attached network by unauthorized agents
Description: Likelihood that unauthorized agents can read data from the transmission media on the directly attached network. For example, a wireless network in an apartment that is accessible from the shared hallway or another apartnement, or a wired network with exposed jacks in a public library.
Rationale: While confidentiality of data transmitted across public networks is usually handled by the system the network interface is integrated into, the network interface is usually responsible for confidentiality on the local directly attached network.
Type: Affects likelihood of attack.
***[LIS-L-0]** Foreseeable use is only authorized agents with access to directly attached network
***[LIS-L-1]** Foreseeable use includes occasional access by unauthorized agents to directly attached network
***[LIS-L-2]** Foreseeable use includes frequent access by unauthorized agents to directly attached network
**[ADM]** Availability and skill of administration
Description: What the availability and skill of administration is for the product.
@@ -1787,39 +1799,39 @@ Type: Affects impact of attack.
#### C.5.2.1 Wired network interface use cases
| Use case | LOC | NET | COM | ADM | SYS | SDS | SDT | FUN | INT | Sec Pro |