StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy - Research Paper Example

Cite this document
Summary
The paper "Essential Components of a Wireless Security Policy, the Difference between Wireless and Wired LAN Security Policy" discusses that essential components of the Wireless Security Policy are the mandatory change of password for the Wi-Fi Protected Access (WPA)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy
Read Text Preview

Extract of sample "Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy"

Download file to see previous pages

The Wireless Security Policy includes a list of standard devices allowed to connect to the wireless local area network. Since it would be easier to diagnose a problem including the implementation of solutions when there are fewer variables to consider. Wired local area network IP addresses in some instances can be dynamic for each of the devices connected to the local area network. However, in the wireless local area network, static IP is assigned to the MAC address to ensure that only authorized devices connect to the local area network.

Since the possibility of security breaches or infiltration are higher using the wireless local area network the security policy normally do not allow devices intending to connect to the wireless local area network to access beyond a finite area. Most often this area is not accessible to normal human traffic from outside the perimeter of the organization’s property. Due to the magnitude of system administrative resources that are assigned to the wireless local area network to ensure the protection of the infrastructure only top executives is given access to the wireless local area network.

The wireless network policy also mandates that the configuration of the link icon that will enable the wireless device to connect to the wireless local area network be done by the organization’s system administrators. This is to ensure that no rider or malicious codes accompany the authentication process of the wireless device as it connects to the wireless local area network. In some instances the organization’s wireless security policy only allows the devices supplied by the organization to connect to its wireless local area network.

The security policy also mandates that the local virus protection system of the wireless devices is up to date.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Essential Components of a Wireless Security Policy, the Difference of Research Paper, n.d.)
Essential Components of a Wireless Security Policy, the Difference of Research Paper. Retrieved from https://studentshare.org/information-technology/1409656-discuss-the-main-components-that-you-need-to-write
(Essential Components of a Wireless Security Policy, the Difference of Research Paper)
Essential Components of a Wireless Security Policy, the Difference of Research Paper. https://studentshare.org/information-technology/1409656-discuss-the-main-components-that-you-need-to-write.
“Essential Components of a Wireless Security Policy, the Difference of Research Paper”, n.d. https://studentshare.org/information-technology/1409656-discuss-the-main-components-that-you-need-to-write.
  • Cited: 0 times

CHECK THESE SAMPLES OF Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy

The Negative Impacts of Cybercrime on Business and Society

It can begin as something seemingly harmless, and rise to one of the gravest threats to personal and national security that exists today.... Moreover, Cyber threats are becoming a dominant and challenging factor for organizations, as it leverages many risks that are constantly changing as cyber-crime spread by a number of peoples acting independently and having their own varied self-interest (Hardin, 1968), every now and then, there are new security breaches resulting in stolen credit card records, stolen personal information and losses in terms of customer confidence, as well as revenue....
27 Pages (6750 words) Research Paper

Networking and Management

The paper "Networking and Management" tells us about computer networks.... It is a connection of two or more computers to share resources and data.... These shared resources can include devices like printers and other resources like electronic mail, internet access, and file sharing.... hellip; A computer network can also be seen as a collection of Personal computers and other related devices which are connected, either with cables or wirelessly, so that they can share information and communicate with one another....
16 Pages (4000 words) Essay

Guide to Intrusion Detection and Prevention Systems

nbsp;… Network engineers, computer science professionals and other information security stakeholders are fighting tooth and nail to ascertain that they adopt the best set of tools for the implementation of secure mechanisms for the detection and prevention of intrusion in to an organization's computer system or network.... nbsp; This has consequently resulted into most network security stakeholders doing all their best to ascertain that there is maximal security against any unauthorized acts of intrusion....
16 Pages (4000 words) Literature review

Local Area Networking Technology - Primary School

From the paper "Local Area Networking Technology - Primary School" it is clear that regarding security effectiveness, the security for files, programs and private information will be highly guaranteed using LAN technology as compared to using external hardware devices.... To do this, it is important to start by analysing the traffic flow of the lan in primary school.... ssentially, the significance of analysing the traffic flow is to determine the bandwidth usage on the lan network while conducting objective data analysis with the aim of performance tuning, volumetric planning and updating the hardware in use....
16 Pages (4000 words) Coursework

Cyber Criminals and Other Data Security Dangers

Although, every online organization has a privacy policy which states how they will handle and secure customer data at the same time there are no verification criteria.... This paper “Cyber Criminals and Other Data security Dangers” gives a detailed overview of data safety odds by discussing true world examples.... The author popularizes the possibilities of ISO 27001 Information security Management Standard which aims to rectify and mitigate those threats....
16 Pages (4000 words) Term Paper

The Athletes Shack Wireless Upgrade

When designing a wireless point to point connectivity, the distance is always considered due to limitation of wireless technology.... The embedded security technologies on a wireless architecture are now standardized, as they are available by default in all vendor manufactured wireless devices.... Moreover, after securing the data in transit by encryption, we have also proposed a wireless intrusion prevention system that will continuously monitor and prevent the network from cyber threats....
12 Pages (3000 words) Case Study

Network Security and Control Mechanisms - Threats and Challenges

hellip; Although implementation of technological solutions is usually the most applied response to wireless security threats and vulnerabilities, wireless security is most basically a management issue.... This paper ''Network security and Control Mechanisms - Threats and Challenges'' presents a framework that is designed to help managers to understand and to be able to assess the various threats associated with wireless technology use.... There are several database security layers such as database administration, system administration, security office, developers and employees....
15 Pages (3750 words) Research Paper

Security in Wireless Network

This results from the transmission of wireless network data between devices via the air as well as radio waves, making it susceptible to individuals who are not authorized.... verview of wireless SecurityGoing wireless mainly involves ensuring the connection of the “access point” of the internet such as DSL modem and cable to a wireless router that has the capacity to send the signal via the air.... This literature review "security in Wireless Network" presents data security as an ultimate perilous issue in ensuring safe information transmission via the internet....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us