In: Computer Science
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings and provide a recommendation to your company CIO.
Hi brother/ sister,
We will discuss about wireless security policy document,
Deploying a wireless LAN without security policy is like piloting an airplane without instructions. You will probably get off the ground , but what happens next is largely a matter of chance , and someone will very likely get hurt. many organisations realize that they need a WLAN security policy, but don't know how to go about creating one.
Uses of wireless security policy document:
As defined by RFC 2196, the IEFT's Site Security Handbook, a security policy is a formal statement of the rules by which people who are given access to an organisation's technology and information assets must abide. There are many kinds of security policies, including Password policies, Remote Policies, Vulnerability Assessment Policies, Mobile Device Policies, Acceptable Use Policies, Wireless Communication Policies.The assets protected by each policy may differ , but all share common goals.
1. Define assets, risks and security objectives. How would know you what security measures to implement if you don't implementation
2 Identify required security practices and measures. You You get deploy every available security measures.
3.Dictate acceptable behaviour and enforcement
5.server for vehicle for achieving consequences
There may be relationship between security,
There Maybe be relationship between security Policies. For example, wireless may be used both internal and remote network access, with password authentication. New policies are best designed as an extension to existing policies, to reduce duplicated effort and conflicting rules.When creating a WLAN security policy, reusing relevant parts of your wired network and system security policies can help you achieve consistent protection. WLAN may pose unique security risk and require some different measure, but don't needlessly reinvent the wheel.