Chapter 8: WLAN Policy and Risk Management


Overview

The security policy life cycle, as suggested by J. Craig Lowery [1] in a recent white paper, is a model incorporating the following nine phases:

  1. Draft. Representative committees write policies.

  2. Adopt. Administration reviews and approves policies.

  3. Implement. Administration defines procedures to implement the policies.

  4. Educate. Users receive training about the new policies and procedures.

  5. Deploy. Policies are put into effect; related technical solutions are deployed.

  6. Monitor. Security team observes the computing environment for policy violations.

  7. Enforce. Violators are punished as prescribed by policy.

  8. Reevaluate. Policies are reviewed for continued relevance and accuracy.

  9. Revise . Policies are revised as needed to keep them current, relevant, and accurate.




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net