StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Security Policy - Assignment Example

Cite this document
Summary
The paper "Wireless Security Policy" discusses that the notion of wireless security policy is principally viewed to be the basis of an organizations’ information security. There lay several organizations belonging to this modern-day context such as First Northern Bank…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Wireless Security Policy
Read Text Preview

Extract of sample "Wireless Security Policy"

Wireless Security Policy Wireless Security Policy 1 Wireless Security Policy Overview Wireless security policy mainly signifies the protection of confidentiality, accessibility and reliability of wireless network data as well as infrastructure from being negotiated through the unlawful use of wireless network access technology (CSIT, 2008). First Northern Bank, established in the year 1910 as a medium-sized banking organization, might also be assumed to be in requirement for wireless security policy to improve its services quality to a substantial extent. It is worth mentioning that the banking organization is incessantly making deliberate efforts towards making its online banking facility safer as well as secured so that it can raise shareholders’ value at large and attract a huge figure of customers representing a larger proportion of the market share (First Northern Bank, 2014). Thus, it can be affirmed that First Northern Bank prioritizes strengthening wireless security policy in order to make its online banking procedure much safer for the users. 1.2 Purpose and Scope After acquiring a brief idea about the notion of wireless security policy, it can be affirmed that the prime purpose of this policy is to forbid the deployment of unsecured and open wireless network access environments (CSIT, 2008). In this similar context, the purpose of this policy within First Northern Bank is to secure the online banking transactions in various ways that may encompass comprehending the potential threats and safeguarding internet related transactions among others (First Northern Bank, 2014). It would be vital to mention that the scope of wireless security policy applies to every personnel, consultant, contractor and other temporary workers belonging to the banking organization who preserve a wireless infrastructure device for serving better to the customers, resulting in increasing customer base and profitability (CSIT, 2008). 1.3 Applicability The idea of wireless security policy is applied to every business organization, whether large, mid or small-sized, which is mainly concerned with offering safe solutions to the customers. It has been quite apparent in this regard proper and relevant applicability of this particular policy plays a crucial role to attract the customers to carry out transactions enormously with such companies that ensure greater trust and security (CSIT, 2008). It is worth mentioning in this similar concern that the wireless security policy is applied within online banking segment of First Northern Bank. Notably, the various facets of this policy fundamentally include multi-factor authentication, privacy policies, encryption, password fortification along with pin and anti-virus protection among others (First Northern Bank, 2014). 1.4 Wireless Network Security Requirements The organizations belonging to this modern day context, such as First Northern Bank, often adopt the notion of wireless security policy in order to ensure that their operational networks remain safe, particularly from any sort of external attack, simultaneously emphasizing that their data communications tools remain protected at large. Thus, there lays certain requirements relating to network security that should be taken into concern by such organizations for attaining the above described objectives. In this similar concern, the various wireless security requirements may include encryption of stored data with the execution of certified algorithms, adoption of two-authentication program using security smart card or dongle and following bio-metric approaches. In addition, the other requirements of network security encompass the presence of both updated as well as patched operating systems, up-to-date antivirus programs, no ‘proxy’ along with ‘peer-to-peer’ software running and enabled Windows firewall among others (Rysavy Research, 2007). 1.5 Wireless Network Access Requirements Apart from wireless security network requirements, organizations like First Northern Bank would also require implementing certain tools relating to wireless network access for securing their respective online business facilities. In this similar concern, the diverse wireless network access requirements would include a Windows or a Macintosh laptop computer, wireless Ethernet card, valid e-mail address along with password and operating system supporting data encryption. One of the prime and basic requirements of wireless network access is the coverage area. It would be vital to mention in this similar context that for making a wireless connection, one must fall within the coverage area of a specific wireless network, which offers greater internet access (Lesley University, n.d.). Thus, for making and preserving a smooth wireless network access, the initial requirement for First Northern Bank would be to remain within such a coverage area of the wireless network, which provides broader access to internet users. 1.6 Wireless Device Requirements First Northern Bank requires certain wireless devices for making its online banking facility safer and more secured. In this regard, the various wireless device requirements for the banking organization would include hubs, routers, Network Interface Cards (NICs), modems and firewalls among others. Hubs are regarded as simple networking instruments that possess numerous ports, creating larger networks. Routers, on the other hand, are viewed as devices that connect Internet Service Providers (ISPs) to a corporate IT environment, managing data communication procedures with dissimilar remote sites. NICs, also acknowledged as network cards, are denoted as potential mechanisms based on which, computers connect to a particular network. Specially mentioning, the basic functionality of modems is to form internet connections by transforming digital signals into analog ones from a specific computer. Correspondingly, firewalls are regarded as effective networking devices that control greater access towards organization’s network (Gonda, n.d.). 1.7 Wireless Standards Supported By First Northern Bank First Northern Bank has been apparently observed to remain much committed towards ensuring that its customers’ online banking experience is secure as well as safe. There are numerous aspects through which it can be ascertained that the bank is able to support wireless standards towards the attainment of its predetermined business targets. These aspects include encryption, firewalls and Digital Identity Verification (DIV) among others. The bank maintains the wireless standard relating to encryption, making diverse encryption levels available on the browsers. In relation to firewalls, the bank maintains wireless standards by employing filtering routers and ensuring the blockage of unauthorized users. With regards to the facet of DIV, the bank possesses a digital server certificate based on which, internet related transactions are protected (First Northern Bank, 2014). Subsequently, these can be identified as the particular wireless standards that are largely supported by First Northern Bank for making its online banking facility safer and more reliable. 1.8 Ethical Guidelines Associated with Wireless Networks in First Northern Bank Several ethical guidelines have been apparently noted as associated with wireless networks in First Northern Bank. The initial guideline herein suggests that accessing wireless internet connection of one particular individual without his/her explicit permission is unethical. Thus, in order to restrict such unethical practices, the banking organization needs to follow certain ethical guidelines in the form of introducing anti-virus protection and developing easy e-mail communication among others. It is worth mentioning in this regard that recognizing the most critical as well as common online threats is one of the prime ethical guidelines, which has been found associated with wireless networks in First Northern Bank (First Northern Bank, 2014). 1.9 Policy Enforcement The notion of wireless security policy is principally viewed to be the basis of an organizations’ information security. There lay several organizations belonging to this modern day context such as First Northern Bank, making deliberate attempts to embrace this policy in order to make sure that their respective business information remains secure. Thus, with this concern, it can be affirmed from a broader understanding that the aforementioned policy gets enforced by aiding the users to comprehend about the significance of information security and making them aware about the implementation program emphasizing security awareness. Specially mentioning, once the above discussed policy is established, it is ought to be communicated to every individual of First Northern Bank including its contractors, vendors and employees among others who are liable for enforcing as well as complying with it (Gonda, n.d.). 1.10 Terms and Definitions The terms and definitions associated with wireless security policy have been presented in the following. Wireless: An information transfer between various points, which are not attached with any sort of electrical conductor Security: It is a situation of being secured from any sort of threat or danger Internet: It is a method to link one particular computer with another Modem: It validates internet connection by transforming digital signals into analog ones Firewall: It is a mechanism, which protects unauthorized access of the users Source: (Gattiker, 2004) References CSIT. (2008). Purpose. Policy: 10.7. Wireless Security Policy, 1-5. First Northern Bank. (2014). About us. Retrieved from http://www.thatsmybank.com/about-us/about-first-northern-bank/vision-mission-values.html First Northern Bank. (2014). Safe online banking. Retrieved from http://www.thatsmybank.com/service-center/online-support-security/safe-online-banking.html First Northern Bank. (2014). Security information. Retrieved from http://www.thatsmybank.com/service-center/online-support-security/security-information.html Gonda. (n.d.). Introduction. Chapter 3: Networking Components and Devices, 120-168. Gattiker, U. E. (2004). The information security dictionary: defining the terms that define security for e-business, internet, information, and wireless technology. United States: Springer. Lesley University. (n.d.). Information technology. Retrieved from http://support.lesley.edu/support/articles/97666-lesley-wireless-network-access-requirements Rysavy Research. (2007). Security requirements. Security Requirements for Wireless Networking, 2-7. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless Security Policy Assignment Example | Topics and Well Written Essays - 1250 words - 1, n.d.)
Wireless Security Policy Assignment Example | Topics and Well Written Essays - 1250 words - 1. https://studentshare.org/information-technology/1829458-wireless-security-policy
(Wireless Security Policy Assignment Example | Topics and Well Written Essays - 1250 Words - 1)
Wireless Security Policy Assignment Example | Topics and Well Written Essays - 1250 Words - 1. https://studentshare.org/information-technology/1829458-wireless-security-policy.
“Wireless Security Policy Assignment Example | Topics and Well Written Essays - 1250 Words - 1”. https://studentshare.org/information-technology/1829458-wireless-security-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Security Policy

Corporate Acceptable Use Policy

hellip; The paper intends to discuss the purpose of the Acceptable Use policy (AUP) developed by AT&T for its employees.... An Acceptable Use policy is a collection of particular rules and policies which are implemented by the network.... The paper intends to discuss the purpose of the Acceptable Use policy (AUP) developed by AT&T for its employees.... The Purpose of an Acceptable Use policy An Acceptable Use policy is a collection of particular rules and policies which are implemented by the network and websites managers in order to enact certain restrictions regarding the utilization of available websites and networks....
5 Pages (1250 words) Case Study

Information Systems

WLAN installations require a documented security policy, the use of data encryption, verification of ongoing policy enforcement and security incident reporting procedures.... wireless security gateways should meet the government's rigorous FIPS 140-2 (Federal Information Processing Standards) security-validation program.... Other key problems for hospitals are:Need for Privacy: Hospitals must comply with the Health Insurance Portability and Accountability Act (HIPAA), which requires that all electronic patient records meet stringent security measures....
2 Pages (500 words) Essay

Creating the report

The following policies are vital: Password policy of networking devices and hosts, wireless network security policy, Anti-Virus security policy and physical security policy.... The scope of this policy will also… If any other laboratories exist in the organization will be exempted from the scope of this policy and will be treated as per the specific policy if Full Paper policy Development Network Access Scope This policy is applicable to all other departments that are internally connected, the organization, remote branches, employees and third parties i....
2 Pages (500 words) Research Paper

Analysis of the Product - Mac Book Pro

egulation and policy Regulations and policies for the Mac book pro range can be categorized into legislation, company and government.... In America, the social security number may be collected, but this can be in the case where one is setting up a wireless account (Miser, 2012)....
2 Pages (500 words) Essay

Management Information System

Once the hiring period is over with the bike having not been returned (ID tag missing in the database) the system should start charging the client based on an agreed policy.... Finally, the network, especially GPS, has helped the company to track its bicycles, which is useful for operations management and security purposes.... A wireless network helps Denver B-cycle to manage its business operations particularly being able to rent out bicycles without the need for physical contact between business managers and customers....
1 Pages (250 words) Coursework

RADIUS Implementation

Hacking exposed wireless: wireless security secrets & solutions.... the Network policy Server found in Windows Server 2012 possesses some features that are compatible with RADIUS, especially in relation to the company's network environment.... The configuration settings capacity also extends to shared secrets which can be migrated the Network policy Server (Cache, 2007).... uestion ThreeAs the systems administrator, I would consider using RADIUS templates primarily due to the cost and time saving benefits accrued when configuring the Network policy Server (NPS) to multiple servers in the organization....
2 Pages (500 words) Essay

The Technician's Basic Set up Guide for the Cisco Linksys e2000 Router

hellip; Network access translation or NAT is a security measure or setting for the network which is done on the router or firewall.... et is a security measure or setting for the network which is done on the router or firewall.... This is a great way to enforce security because all traffic to and from the network must go thru one translation process....
8 Pages (2000 words) Assignment

Computer Security of Unix

uestion twoThe operating system has several ways to manage access some of them includeUser Rights PolicyThis policy determines which users are granted specific rights to the system some we have levels of user groups each coming with specific privileges an example is the administrator who has extensive rights to all components of the system creating other administrators, removing users, installing software's among others.... er File SecurityWithin the various user groups some operating systems provides an additional future to protect files further on per file basis, the security properties that can be set at this point are auditing, permissions and ownership....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us