Question

In: Computer Science

Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the...

Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings and provide a recommendation to your company CIO.

Solutions

Expert Solution

Hi brother/ sister,

We will discuss about wireless security policy document,

Deploying a wireless LAN without security policy is like piloting an airplane without instructions. You will probably get off the ground , but what happens next is largely a matter of chance , and someone will very likely get hurt. many organisations realize that they need a WLAN security policy, but don't know how to go about creating one.

Uses of wireless security policy document:

As defined by RFC 2196, the IEFT's Site Security Handbook, a security policy is a formal statement of the rules by which people who are given access to an organisation's technology and information assets must abide. There are many kinds of security policies, including Password policies, Remote Policies, Vulnerability Assessment Policies, Mobile Device Policies, Acceptable Use Policies, Wireless Communication Policies.The assets protected by each policy may differ , but all share common goals.

1. Define assets, risks and security objectives. How would know you what security measures to implement if you don't implementation

2 Identify required security practices and measures. You You get deploy every available security measures.

3.Dictate acceptable behaviour and enforcement

5.server for vehicle for achieving consequences

There may be relationship between security,

There Maybe be relationship between security Policies. For example, wireless may be used both internal and remote network access, with password authentication. New policies are best designed as an extension to existing policies, to reduce duplicated effort and conflicting rules.When creating a WLAN security policy, reusing relevant parts of your wired network and system security policies can help you achieve consistent protection. WLAN may pose unique security risk and require some different measure, but don't needlessly reinvent the wheel.


Related Solutions

Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the...
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following: Describe if the wireless network will be on a different subnet to protect your wired network. What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed to keep unauthorized users out of your network? Then, in 250 words, summarize your findings...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee...
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Create the official communication document.   Part II:     18.  a) What is the main problem with IPv4 that IPv6 was created to solve?            b) How does IPv6 solve this problem?    19.  a) What has been holding back the adoption of IPv6?           b) What is pushing IPv6 adoption now?
a) Discuss the benefits of wireless network communication with a simple example. b) Explain why wireless...
a) Discuss the benefits of wireless network communication with a simple example. b) Explain why wireless network communication is slower than wired network communication on most occasions. c) Wireless bridges are gaining popularity in connecting discrete campuses or business premises. Discuss the advantages and disadvantages of wireless bridges.
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security...
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. The following elements should be incorporated into your plan: *Authentication system *External website security *Internal website security *Remote access solution *Firewall and basic rules...
a) Discuss the benefits of wireless network communication with a simple example. [3 Marks] b) Explain...
a) Discuss the benefits of wireless network communication with a simple example. [3 Marks] b) Explain why wireless network communication is slower than wired network communication on most occasions. [2 Marks] c) Wireless bridges are gaining popularity in connecting discrete campuses or business premises. Discuss the advantages and disadvantages of wireless bridges. [5 Marks]
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT