Introduction
Wireless technologies are becoming common in most organizations. There has been a call to ensure that there are security standards that have been put in place to ensure that there is a security of the wireless technologies in organizations. This paper will focus on wireless security policy and recommend on best practices that will be required for any organization to be able to get a wireless security assurance.
There will be a need to set the wireless security policy which will address the use of wireless network in the organization. This section will entail the various wireless security issues that need to be included in the policy. The organization is committed to protecting resources, employees, and clients so from intentional or unintentional damage that will arise from the use of wireless networks. Wireless security overview
The wireless security policy will cover the use and the access to the wireless network spectrum. The policy will also contain the wireless network use so that users will know how to use the wireless network to avoid compromising the security of the wireless network spectrum. There is a need to ensure that there is better management and enhancement of the wireless network that will be used in the entirety of the spectrum. With the popularity of personal devices that are considered to be personal, there is a need to ensure that there is an understanding of security policy that need to be observed in the process.
Purpose and scope
The purpose of the wireless security policy is to define the conditions that must be met by all wireless devices that want to connect to the organization wireless network. These conditions must be met in order to have security of the network. It is only wireless devices that have been assessed and known to meet the requirements that will be allowed to access the wireless network in the company.
The scope of the policy will cover all wireless communication devices that will be connected to the organizational network. It includes any communication that will make use of packet data. Any wireless device that does not have the connectivity to the organization internal network does not fall under this policy and will not be covered.
Applicability
The policy will be applicable to wireless network use and the utilization of resources on the organization internal network. It will be applied when assessing the impact of a security breach and how the breach might have been broken. The policy will also apply in acting as a guide to the users on how to make use of the network resources of the company. It is one of the requirements that will ensure that there is better understanding of the use of the wireless devices and how to ensure that the security is intact.
Wireless network security requirements
There are requirements that are needed in order to have security of the wireless network in the organization. One of the requirements is that there is a need to encrypt sensitive data that are communicated over public networks. If there are sensitive data that are communicated on the network, the communication should be done with the data encrypted. Most organization and security standards recommend 128-bit encryption in the entire process.
Another wireless security requirement is that organizations should support two-way authentication. All users should be authenticated as they use the organization resources. One of the recommended approaches to authentication of the users is the use of biometric approaches to authentication.
There is also a need to follow regulations for wireless networks and standards. The wireless network standards need to be achieved and managed with the use of observation on the wireless standards and networks.
Wireless network access requirements
There is a need to have access control in the access of the wireless network. It will help in the management and enhancement of the security of the network. These are the issues that need to be put in place in order to have all issues and aspects put in place. Access to the network should be done according to the role of the users on the network. Sensitive information should be stored on the network and in secure networks. It will help in the enhancement and management of the wireless security in the network.
Wireless device requirements
The devices that are needed to access the network will be those that have wireless capabilities. The wireless devices should be registered so that they are identified on the network. The devices should also be the responsibility of the users on the network. All users who come with their personal devices should have them registered for easy identification.
Wireless standards supported
There is a need to have wireless standards that will be supported by the organization. One of the standards that need to be followed is Sarbanes Oxley Act, and Health Insurance Portability and Accountability Act (HIPAA).
Ethical Guidelines Associated with Wireless Networks in the Organization
There are ethical standards that are required in the management and use of wireless networks in the organization. One of the ethical standards that will be needed in the use of the wireless network in the organization is that users should use it to work on official work. Because of the ease with which wireless network can be set, many use company resources to do their private businesses. There is also a need to ensure that even personal devices are safe when they are used to access the wireless networks in the company. It is a significant aspect that need to be looked into in the entire process. Wireless networks will ensure that there is better management and enhancement of the wireless standards in the network.
Policy enforcement
The policy is to be followed and adhered to by all users of the network. People who will be deemed not to have followed or breached the security definitions of the policy will face the full force of the organization. The owners of the devices that breached the wireless security policy will face disciplinary action that can lead to termination of employment.
Terms and definition
Wireless network – it is a network which is accessed through the wireless spectrum
HIPAA - Health Insurance Portability and Accountability Act
Wi-Fi – Wireless Fidelity
Conclusion
Wireless networks need to be protected from attacks. The popularity of the wireless networks in many organizations has led to the development of wireless security policies that will ensure that there is safe use of the wireless spectrum. It is an issue of concern thssat has been seen to be on the rise. Many people feel that there is a lot that need to be done in order to have secure networks.
References
Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education.
Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. Wireless Communications, IEEE, 17(1), 51-58.