   Netiquette is the social code of using network communications.
    ◦ A social code defines behaviour rules for people using the internet, and
      wired and wireless LANs
    ◦ The social code defines good manners so that non-violent
      communications can be achieved and everyone is served
   A security policy is a collection of policies that specify how
    security is implemented and managed for a business
    ◦ It includes configuration details such as protocols used, port forwarding
      rules, how data is logged, how passwords are created and maintained
      and the change process.
    ◦ It includes physical security such as locks, security cameras and access
      systems
    ◦ It includes rules about applications and business processes
    ◦ It includes how employees behave when accessing the wired and
      wireless lan and internet. This is defined in the Acceptable Use Policy
Securing the Wlan must use a Defence in Depth strategy
    ◦ Have multiple security measures implemented, multiple layers of security
      controls
   Reduce the Service Set Area – the signal range
    ◦ Reduce power levels (not all equipment can do this) to contain signals
      within business boundaries
   SSID cloaking
    ◦ Disable SSID broadcasts from Access Points
   Mac address filtering
    ◦ Filter host joining the Wlan by Mac address
   Implement the strongest security standard you can
    ◦ WPA2 or WPA if equipment is older with long passphrases
   Create a security policy that mandates configuration and acceptable
    use
    ◦ Educate users and make them accountable
   Monitor Wlans for threats and abnormal behaviour
    ◦ Implement logging, intrusion prevention systems

Policy

  • 1.
    Netiquette is the social code of using network communications. ◦ A social code defines behaviour rules for people using the internet, and wired and wireless LANs ◦ The social code defines good manners so that non-violent communications can be achieved and everyone is served  A security policy is a collection of policies that specify how security is implemented and managed for a business ◦ It includes configuration details such as protocols used, port forwarding rules, how data is logged, how passwords are created and maintained and the change process. ◦ It includes physical security such as locks, security cameras and access systems ◦ It includes rules about applications and business processes ◦ It includes how employees behave when accessing the wired and wireless lan and internet. This is defined in the Acceptable Use Policy
  • 2.
    Securing the Wlanmust use a Defence in Depth strategy ◦ Have multiple security measures implemented, multiple layers of security controls  Reduce the Service Set Area – the signal range ◦ Reduce power levels (not all equipment can do this) to contain signals within business boundaries  SSID cloaking ◦ Disable SSID broadcasts from Access Points  Mac address filtering ◦ Filter host joining the Wlan by Mac address  Implement the strongest security standard you can ◦ WPA2 or WPA if equipment is older with long passphrases  Create a security policy that mandates configuration and acceptable use ◦ Educate users and make them accountable  Monitor Wlans for threats and abnormal behaviour ◦ Implement logging, intrusion prevention systems