6 – Organization of Information Security
Select > > > > > > .
Control 6: Organization of information security of the ISO 27002 standard focuses on ensuring that your organization supports and maintains information security operations, both on- and off-site.
To assess your enterprise's compliance with this requirement, use the following reports:
| Dashboards | Reports |
|---|---|
|
n/a |
|
- Suspicious Activity in Wireless Network
-
Reports events that indicate suspicious activity in the wireless network. For example, a malicious user might scan ports to discover open doors or weak points in the wireless network. The table provides results by the type of suspicious activity, details about the target and source systems, and the number of events.
-
In the logical model, use the variable to specify wireless networks. For more information, see the Solutions Guide for ArcSight Compliance Pack for IT Governance.