SlideShare a Scribd company logo
1 of 2
   Netiquette is the social code of using network communications.
    ◦ A social code defines behaviour rules for people using the internet, and
      wired and wireless LANs
    ◦ The social code defines good manners so that non-violent
      communications can be achieved and everyone is served
   A security policy is a collection of policies that specify how
    security is implemented and managed for a business
    ◦ It includes configuration details such as protocols used, port forwarding
      rules, how data is logged, how passwords are created and maintained
      and the change process.
    ◦ It includes physical security such as locks, security cameras and access
      systems
    ◦ It includes rules about applications and business processes
    ◦ It includes how employees behave when accessing the wired and
      wireless lan and internet. This is defined in the Acceptable Use Policy
Securing the Wlan must use a Defence in Depth strategy
    ◦ Have multiple security measures implemented, multiple layers of security
      controls
   Reduce the Service Set Area – the signal range
    ◦ Reduce power levels (not all equipment can do this) to contain signals
      within business boundaries
   SSID cloaking
    ◦ Disable SSID broadcasts from Access Points
   Mac address filtering
    ◦ Filter host joining the Wlan by Mac address
   Implement the strongest security standard you can
    ◦ WPA2 or WPA if equipment is older with long passphrases
   Create a security policy that mandates configuration and acceptable
    use
    ◦ Educate users and make them accountable
   Monitor Wlans for threats and abnormal behaviour
    ◦ Implement logging, intrusion prevention systems

More Related Content

What's hot

CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter SecuritySam Bowne
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYabdul talha
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10Pooja Soni
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsDarraghCommsec
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhdtopiccom
 
cisco security training
cisco security trainingcisco security training
cisco security trainingqosnetworking
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanZaibi Gondal
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionAshwin Harikumar
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Most Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex TrainingMost Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex TrainingBryan Len
 

What's hot (20)

CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Homework0703
Homework0703Homework0703
Homework0703
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network security
 Network security Network security
Network security
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network security
Network securityNetwork security
Network security
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Most Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex TrainingMost Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex Training
 

Viewers also liked

Mapa Responsabilidad social y etica
Mapa Responsabilidad social y eticaMapa Responsabilidad social y etica
Mapa Responsabilidad social y eticaAime Rodriguez
 
DIY! Weihnachtsgeschenke Basteln
 DIY! Weihnachtsgeschenke Basteln  DIY! Weihnachtsgeschenke Basteln
DIY! Weihnachtsgeschenke Basteln animatedgun3325
 
TWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vorTWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vorTWT
 
Personal statement
Personal statementPersonal statement
Personal statementamybrockbank
 
Linked in resume 1
Linked in resume 1Linked in resume 1
Linked in resume 1Kat Raess
 
Mars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting cardMars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting cardFreyk John Geeris
 
RFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIMRFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIMJonathan Davis
 

Viewers also liked (15)

Calendário
CalendárioCalendário
Calendário
 
Mapa Responsabilidad social y etica
Mapa Responsabilidad social y eticaMapa Responsabilidad social y etica
Mapa Responsabilidad social y etica
 
DIY! Weihnachtsgeschenke Basteln
 DIY! Weihnachtsgeschenke Basteln  DIY! Weihnachtsgeschenke Basteln
DIY! Weihnachtsgeschenke Basteln
 
TWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vorTWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vor
 
Personal statement
Personal statementPersonal statement
Personal statement
 
Linked in resume 1
Linked in resume 1Linked in resume 1
Linked in resume 1
 
NOS Teletekst 26 Mei 2008
NOS Teletekst 26 Mei 2008NOS Teletekst 26 Mei 2008
NOS Teletekst 26 Mei 2008
 
Mapa planeacion
Mapa planeacionMapa planeacion
Mapa planeacion
 
Phoenix Descending - Mars
Phoenix Descending - MarsPhoenix Descending - Mars
Phoenix Descending - Mars
 
Mars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting cardMars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting card
 
Happy Birthday Singapore
Happy Birthday SingaporeHappy Birthday Singapore
Happy Birthday Singapore
 
Miguel uriel 2
Miguel uriel 2Miguel uriel 2
Miguel uriel 2
 
Inter soggettività
Inter soggettivitàInter soggettività
Inter soggettività
 
Bitácora 2
Bitácora 2Bitácora 2
Bitácora 2
 
RFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIMRFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIM
 

Similar to Policy

Wireless Network Assessment | Network Security
Wireless Network Assessment | Network SecurityWireless Network Assessment | Network Security
Wireless Network Assessment | Network SecurityCyber Security Experts
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012AVEVA
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxBluechipComputerSyst
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxMohammed Abdul Lateef
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET Journal
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfsoftwaretrainer2elys
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdfitconsultancynj104
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1KowsalyaS12
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxkkhhusshi
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing3G4G
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to Policy (20)

Wireless Network Assessment | Network Security
Wireless Network Assessment | Network SecurityWireless Network Assessment | Network Security
Wireless Network Assessment | Network Security
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdf
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Security standard
Security standardSecurity standard
Security standard
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Firewall
FirewallFirewall
Firewalllyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (16)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Capacity
CapacityCapacity
Capacity
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Policy

  • 1. Netiquette is the social code of using network communications. ◦ A social code defines behaviour rules for people using the internet, and wired and wireless LANs ◦ The social code defines good manners so that non-violent communications can be achieved and everyone is served  A security policy is a collection of policies that specify how security is implemented and managed for a business ◦ It includes configuration details such as protocols used, port forwarding rules, how data is logged, how passwords are created and maintained and the change process. ◦ It includes physical security such as locks, security cameras and access systems ◦ It includes rules about applications and business processes ◦ It includes how employees behave when accessing the wired and wireless lan and internet. This is defined in the Acceptable Use Policy
  • 2. Securing the Wlan must use a Defence in Depth strategy ◦ Have multiple security measures implemented, multiple layers of security controls  Reduce the Service Set Area – the signal range ◦ Reduce power levels (not all equipment can do this) to contain signals within business boundaries  SSID cloaking ◦ Disable SSID broadcasts from Access Points  Mac address filtering ◦ Filter host joining the Wlan by Mac address  Implement the strongest security standard you can ◦ WPA2 or WPA if equipment is older with long passphrases  Create a security policy that mandates configuration and acceptable use ◦ Educate users and make them accountable  Monitor Wlans for threats and abnormal behaviour ◦ Implement logging, intrusion prevention systems