Thursday, October 31, 2019
Wireless Security Policy Assignment Example | Topics and Well Written Essays - 1250 words
Wireless Security Policy - Assignment Example The implementation and administration of radio communication in the wireless networks occurs at the physical layer of the Open Systems Interconnection, or OSI, model (Rus & Donohue, 2010). This paper will address a wireless security policy for a medium sized banking organization, highlighting the policy overview, purpose, scope, applicability and security requirements. It will also address wireless network requirements, device requirements, standards supported by the organization, ethical guidelines and policy enforcement. Wireless Security Policy Overview Wireless networks occur in various forms, which are wireless PAN (WPAN), wireless LAN (WLAN), wireless WAN (WWAN), wireless MAN (WMAN), wireless mesh networks and cellular networks. Devices in relatively small physical areas are connected through WPAN. WLANs link several devices over short distances via wireless distribution methods such as internet access points, allowing users connection and mobility simultaneously. WMANs link a number of WLANs while WWANs cover large geographical areas, like neighboring cities and towns. For a banking organization, policies create a foundation on which all security initiatives are built. Therefore, the bank needs to come up with standards and policies on data integrity and confidentiality while putting into consideration security levels imposed by government regulation (NIST, 2003). Purpose and Scope The key purpose of wireless network security in a bank is to allow employees freedom of mobility while accessing the network to deliver better customer service without compromising the confidentiality of both the customersââ¬â¢ and the organizationââ¬â¢s information (Goldsmith, 2005). The security measures implemented should protect the wireless signals from their vulnerability to eavesdropping and meet audit requirements. Since standards for wireless network security emerge and evolve continuously with technological developments, the bank must keep abreast with the chan ges to avoid being exposed to reputation and strategic risks. The bankââ¬â¢s ability to avoid or manage the risks is dependent on the effectiveness of its management and board oversight; effectiveness of procedures and policies to implement and run wireless projects; the networkââ¬â¢s capacity and reliability; the business continuity planââ¬â¢s adequacy; and the actions taken to monitor undesirable events. Applicability The applicability of the security system should accord clients seamless interactions with the bank and their accounts. This means it must be structured specifically for the requirements of non-company users while prohibiting incidents such as personal use by employees or sending financial records over the network. Although WLANs typically provide unrestricted access to the Internet and an organizationââ¬â¢s entire network, the bank should consider blocking its wireless subnets from its Intranet and intranet. It must be specified who has the authority to u se the WLAN as well as their level of access. Regardless of the way access is allowed, it is essential that the scope of access is determined and defined clearly in the bankââ¬â¢s wireless security policy and implementation (Pahlavan & Krishnamurthy, 2009). The CEO and the head of the technical department should be the only ones with exclusive access to critical information, and the policy should also stipulate that access by one of them should be known by the other. Wireless Network Security Requirements The internal department that will be given the responsibility of deploying the wireless access points (WAPs) and the devices, also known as stations, to be used within the network, should also be determined.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.