Management Countermeasures


Management countermeasures set the stage for all that happens on the WLAN. Based on policy, these countermeasures should work to:

  • Identify who may use WLAN technology in a corporation and limit access by function, location, and workgroup or security clearance.

  • Identify whether Internet access is required beyond the WLAN network. Some WLAN applications are for intranets only.

  • Describe who can install access points and other wireless equipment. With the ease of installation and configurations, it is important to verify proper use of the technology.

  • Provide limitations on the location of and physical security for access points to minimize the propagation (distance and availability) of the signal.

  • Describe the type of information that may be sent over wireless links to reduce compromises of sensitive data.

  • Describe conditions under which wireless devices are allowed.

  • Define standard security settings for access points to reduce risks and establish uniform configurations standards.

  • Describe limitations on how the wireless device may be used, such as location in and outside the building and near sensitive areas, to gain access to personal or sensitive data.

  • Describe the hardware and software configuration of all wireless devices.

  • Provide guidelines on reporting losses of wireless devices and security incidents

  • Provide guidelines for the protection of wireless clients to minimize/ reduce theft.

  • Provide guidelines on the use of encryption and key management systems.

  • Define the frequency and scope of security assessments to include access point discovery.




Information Technology Security. Advice from Experts
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net