Wireless Security Policy for Corporate Infrastructure: ITT-116

Verified

Added on  2022/10/15

|3
|431
|24
Report
AI Summary
This report outlines a Wireless Security Policy, addressing key aspects of wireless network security within a corporate infrastructure. The report emphasizes the importance of a dedicated wireless network, separate from the internal network, to enhance security. It recommends the use of WPA2 PSK with AES encryption for robust protection and highlights the need for a well-defined security policy that covers the scope and purpose of wireless network usage. The report also stresses the importance of user authentication and authorization, proper access point placement, and network monitoring to ensure security. It concludes by emphasizing the necessity for regular policy reviews and updates, along with the avoidance of less secure devices. The report is based on research, including a reference to a study on hierarchical security frameworks for wireless sensor networks in smart cities and security of self-organizing networks. The author has described the type of encryption utilized, attributes of the encryption methodology and the kind of logon security employed.
Document Page
Running head: WIRELESS SECURITY POLICY DOCUMENT
Wireless Security Policy document
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
WIRELESS SECURITY POLICY DOCUMENT
Description of the Wireless network -
With the innovation in technology the security is behind development and the
organization adopting the wireless networking has the need to implement wireless security policy
for the management of the access of the users to the wireless network. It is recommended that the
wireless network is needed to be kept in different subnet such that the users of the wireless
network does not have access to the internal network of the organization.
Encryption type and logon security -
WPA2 PSK with AES encryption is needed to be used for increasing the security of the
wireless network. The security policy is needed to be developed such that it can state the
necessary reasons and scope of its usage for the organization (Wu et al., 2016). The authorization
and identity of the user is needed to be maintained for allowing access of the user to connect with
the wireless access point deployed in different areas of the network.
Summarization of findings
The placement of the access point is also an important factor for maximization of
performance and minimization of certain risks such as eavesdropping and other malicious
activity. The logging procedure and network monitoring is needed to be configured such that the
activity of the users can be audited and the wireless security policy is needed to provide the
requirement for perform auditing. The development process of the wireless network is needed to
be validated for the development of the wireless security policy (Pathan, 2016). It is needed to be
reviewed and updated periodically for ensuring that the policy complies with the current business
needs and flexible to adopt the new changes. It is needed to be ensured that the installation of
Document Page
2
WIRELESS SECURITY POLICY DOCUMENT
less secure or non-approved device is needed to be avoided since it can allow an unauthorized
user with different equipment to connect with the network.
References
Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending
against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416-
424.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]