ANSI X9.112 : 2016
Current
The latest, up-to-date edition.
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
27-05-2016
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Wireless Risks
6 Requirements
7 Wireless Security Policy
Annex A (normative) - Wireless Validation Control Objectives
Annex B (Normative) - Wireless Cryptography Controls
Annex C (Informative) - X9 Registry
Annex D (Informative) - OCC Risk Management of Wireless Networks
Gives an overview of wireless radio frequency (RF) technologies and general requirements applicable to all wireless implementations for the financial services industry.
Committee |
X9
|
DevelopmentNote |
Supersedes ANSI X9.112-1 & ANSI X9.112-2. (05/2016)
|
DocumentType |
Standard
|
PublisherName |
American Bankers Association
|
Status |
Current
|
Supersedes |
ANSI X9.69 : 2017 | FRAMEWORK FOR KEY MANAGEMENT EXTENSIONS |
ANSI X9.30.1 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA) |
ANSI X9.57 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY: CERTIFICATE MANAGEMENT |
ANSI X9.95 : 2016 | FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ANSI X9.8-1 : 2015 | FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS |
ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ANSI X9.52 : 1998 | TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ANSI X9.69 : 2017 | FRAMEWORK FOR KEY MANAGEMENT EXTENSIONS |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
ISO 21188:2006 | Public key infrastructure for financial services Practices and policy framework |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ANSI X9.30.2 : 1997 | PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1) |
ANSI X9.31 : 1998 | DIGITAL SIGNATURES USING REVERSIBLE PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY (RDSA) |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.