Monday, November 18, 2019

Wireless Security Best Practices Guide for Business Essay

Wireless Security Best Practices Guide for Business - Essay Example Every company in today’s world is run on wireless network technology. Local Area Networks, generally called LANs, are privately-owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations in company offices and factories to share resources and exchange information. Deploying wireless LAN or wireless network is something like a pilot without instructions to fly an aircraft. One will probably get off the ground; the next thing is probably a matter of chance, someone is likely to get hurt. As it is defined in RFC 2196, the IETS’s site Security Handbook, a security policy is a formal set of rules through which people who are given access to organization’s technology and information assets must abide to. There are many kinds of security policies such as Password Policies, Remote Access Policies, Mobile Device Policies, Vulnerability Assessment Policies, Acceptable Use policies and Wireless Communication Policies. The assets protected by each one of the policies are different but, they all share common agenda. The security policy has the following important specifications to follow for the best benefit. Devices such as notebooks, handhelds, portables, personal digital assistants, smart phones, etc. which are issued by the Information Technology Department should be permitted to get access to the company internal network through wireless technology. Devices should be checked to have pre-configured with necessary operating system and security software which provides an encrypted tunnel (virtual private network) for network traffic; encrypts device hard drives; screens and removes virus and other malware; supports extended user authentication dialog; supports remote file backups; updates software when the software resident on the device is out of date; prevents

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.