The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.