Critical Thinking

WIRELESS all wireless enabled devices like laptops ,

WIRELESS
SECURITY POLICY

INTRODUCTION

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 This policy’s
objective  is to secure and protect the
company’s  wireless network and the assets
within its network  .
The Wireless Local Area Network  Security
Policy applies to all uses and information contained on the network  and the 
people who  are users of the
network. The company
grants access to these resources according to an individual’s role and must
be  well 
managed  to maintain the
confidentiality, integrity, and availability of all information assets.  This policy is meant to ensure that the
deployment and use  of the company’s
wireless local area network is controlled and 
managed in a centralized  manner  to provide high levels of services whilst
maintaining network security. Only those wireless enabled devices that meet the
standards specified in this  document are
approved for connection to the company’s  wireless  network.

 

SCOPE

This wireless
network policy applies to all areas of wireless connectivity to the Company’s   wireless network , and includes all wireless  enabled devices like laptops , desktops
,mobile phones , tablets  and  any form of wireless
communication device capable of transmitting packet data operating
within the Company’s  IP address range. All employees  ,visitors and any other person connected to
the company’s wireless network must adhere to this Policy  . Any form of connection to this network ,
whether from within the premises of the company or directly from a remote location
, must adhere to this policy. In the event that any provision of this
Policy is found to be inconsistent with the provisions of a collective
agreement, the collective agreement will prevail.

 

POLICY STATEMENT

The Company’s
Department Of Information Technology Must ensure :-

      
i.           
All
Wireless  Network Access Points  must be registered and  approved  by the company’s Department of Information
Technology .

    
ii.           
All
wireless LAN hardware implementations shall utilize Wi-Fi certified devices
that are configured to use the latest security features available.

  iii.           
Security
mechanisms should be put in place to prevent the misuse of  Wireless Network Access Points .

  iv.           
All
wireless access points that connect a user to the Local Area Network  shall require users to provide unique
authentication over secure channels and all data transmitted shall be encrypted
with an approved encryption technology.

 

    
v.           
The wireless network security meet the
following standards:

a)    
Users will connect to the WLAN via Access Points, which will
provide the 802.11a/b/g/n connection standard for the client devices.

b)   
Encryption: The wireless networks will utilise AES (Advanced
Encryption Standard) level of encryption

c)    
Authentication: The authentication protocol selected used is
Protected EAP (PEAP). PEAP is an 802.1X authentication type for wireless
networks.

 

RISK ASSESMENT OF WIRELESS NETWORK

The risk
assessment is a process in which the risk is analyzed and explained. The basic
goal of the risk assessment is to control the risk in acceptability.

There are  potential threats  that  attack
the wireless network  system vulnerabilities.
The threats have adverse impacts on an organization  and its business operations. Some of the
security risks of wireless networks  include
;-

a.    
Monitoring attacks:  intercepting aerial signal to obtain information
concerned by analysis.

b.    
Interpolation  attacks: counterfeiting legal user, accessing
system by using wireless channel and obtaining right of system control.

c.     
Unauthorized information service: user
can share systematic information resources under unauthorization.

d.    
The robustness of network: endurance of
network against local destruction or single equipment damage.

e.     
Mobile IP security: information security
problems of management and user in the case of user terminal moving locally or
ranging trans regionally.

f.      
Wireless interference: disturbing the
routine work of wireless channel by transmitting big power signals with the
same frequencies.

 

 AUDITING , MONITORING  AND ENFORCEMENT OF SECURITY POLICY

a.     Monitoring
and auditing

i.                  
The department of Information Technology
should  monitor all traffic logs  for all wireless network devices and systems
for  auditing purposes.

ii.                
The department of ICT should perform
penetration testing to all the Company’s 
wireless devices  in order to
determine the risks associated for protection of Company’s assets.

b.     Enforcement

i.                  
Assisting anybody to circumvent the
administrative access to the Company’s wireless network is a violation to this
policy and   relevant action shall be
taken.

ii.                
Attempting to circumvent the
administrative access to the wireless network is a violation to this policy
and   relevant action shall be taken.

iii.             
Any device found to be in violation of
this policy , or found to be causing 
problems to the wireless network is subject to immediate disconnection
to the network.

iv.             
Any employee found to have violated this
policy may be subject to disciplinary action up to and including termination of
employment.

 

x

Hi!
I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out