SlideShare a Scribd company logo
   Netiquette is the social code of using network communications.
    ◦ A social code defines behaviour rules for people using the internet, and
      wired and wireless LANs
    ◦ The social code defines good manners so that non-violent
      communications can be achieved and everyone is served
   A security policy is a collection of policies that specify how
    security is implemented and managed for a business
    ◦ It includes configuration details such as protocols used, port forwarding
      rules, how data is logged, how passwords are created and maintained
      and the change process.
    ◦ It includes physical security such as locks, security cameras and access
      systems
    ◦ It includes rules about applications and business processes
    ◦ It includes how employees behave when accessing the wired and
      wireless lan and internet. This is defined in the Acceptable Use Policy
Securing the Wlan must use a Defence in Depth strategy
    ◦ Have multiple security measures implemented, multiple layers of security
      controls
   Reduce the Service Set Area – the signal range
    ◦ Reduce power levels (not all equipment can do this) to contain signals
      within business boundaries
   SSID cloaking
    ◦ Disable SSID broadcasts from Access Points
   Mac address filtering
    ◦ Filter host joining the Wlan by Mac address
   Implement the strongest security standard you can
    ◦ WPA2 or WPA if equipment is older with long passphrases
   Create a security policy that mandates configuration and acceptable
    use
    ◦ Educate users and make them accountable
   Monitor Wlans for threats and abnormal behaviour
    ◦ Implement logging, intrusion prevention systems

More Related Content

What's hot

CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
abdul talha
 
Homework0703
Homework0703Homework0703
Homework0703
YUEPINGTSAI
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
Pooja Soni
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
DarraghCommsec
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
Girija Sankar Dash
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
Phdtopiccom
 
cisco security training
cisco security trainingcisco security training
cisco security training
qosnetworking
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
Ashwin Harikumar
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
VC Infotech
 
Most Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex TrainingMost Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex Training
Bryan Len
 

What's hot (20)

CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Homework0703
Homework0703Homework0703
Homework0703
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network security
 Network security Network security
Network security
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network security
Network securityNetwork security
Network security
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Most Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex TrainingMost Advanced Wireless Security Training : Tonex Training
Most Advanced Wireless Security Training : Tonex Training
 

Viewers also liked

Calendário
CalendárioCalendário
Calendário
loucosgameplay
 
Mapa Responsabilidad social y etica
Mapa Responsabilidad social y eticaMapa Responsabilidad social y etica
Mapa Responsabilidad social y etica
Aime Rodriguez
 
DIY! Weihnachtsgeschenke Basteln
 DIY! Weihnachtsgeschenke Basteln  DIY! Weihnachtsgeschenke Basteln
DIY! Weihnachtsgeschenke Basteln
animatedgun3325
 
TWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vorTWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vor
TWT
 
Personal statement
Personal statementPersonal statement
Personal statement
amybrockbank
 
Linked in resume 1
Linked in resume 1Linked in resume 1
Linked in resume 1
Kat Raess
 
NOS Teletekst 26 Mei 2008
NOS Teletekst 26 Mei 2008NOS Teletekst 26 Mei 2008
NOS Teletekst 26 Mei 2008
Cottonwood Technology Fund
 
Mapa planeacion
Mapa planeacionMapa planeacion
Mapa planeacion
Aime Rodriguez
 
Phoenix Descending - Mars
Phoenix Descending - MarsPhoenix Descending - Mars
Phoenix Descending - Mars
Freyk John Geeris
 
Mars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting cardMars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting card
Freyk John Geeris
 
Happy Birthday Singapore
Happy Birthday SingaporeHappy Birthday Singapore
Happy Birthday Singapore
expensivedynamo94
 
Miguel uriel 2
Miguel uriel 2Miguel uriel 2
Miguel uriel 2
Arturo Salmoran Garcia
 
Bitácora 2
Bitácora 2Bitácora 2
Bitácora 2
Sara Borja
 
RFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIMRFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIM
Jonathan Davis
 

Viewers also liked (15)

Calendário
CalendárioCalendário
Calendário
 
Mapa Responsabilidad social y etica
Mapa Responsabilidad social y eticaMapa Responsabilidad social y etica
Mapa Responsabilidad social y etica
 
DIY! Weihnachtsgeschenke Basteln
 DIY! Weihnachtsgeschenke Basteln  DIY! Weihnachtsgeschenke Basteln
DIY! Weihnachtsgeschenke Basteln
 
TWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vorTWT Trendradar: Akku Check View beugt Diabetes vor
TWT Trendradar: Akku Check View beugt Diabetes vor
 
Personal statement
Personal statementPersonal statement
Personal statement
 
Linked in resume 1
Linked in resume 1Linked in resume 1
Linked in resume 1
 
NOS Teletekst 26 Mei 2008
NOS Teletekst 26 Mei 2008NOS Teletekst 26 Mei 2008
NOS Teletekst 26 Mei 2008
 
Mapa planeacion
Mapa planeacionMapa planeacion
Mapa planeacion
 
Phoenix Descending - Mars
Phoenix Descending - MarsPhoenix Descending - Mars
Phoenix Descending - Mars
 
Mars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting cardMars Skyscrapers 3-D greeting card
Mars Skyscrapers 3-D greeting card
 
Happy Birthday Singapore
Happy Birthday SingaporeHappy Birthday Singapore
Happy Birthday Singapore
 
Miguel uriel 2
Miguel uriel 2Miguel uriel 2
Miguel uriel 2
 
Inter soggettività
Inter soggettivitàInter soggettività
Inter soggettività
 
Bitácora 2
Bitácora 2Bitácora 2
Bitácora 2
 
RFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIMRFID Asset Tracking to Rack Unit for DCIM
RFID Asset Tracking to Rack Unit for DCIM
 

Similar to Policy

Wireless Network Assessment | Network Security
Wireless Network Assessment | Network SecurityWireless Network Assessment | Network Security
Wireless Network Assessment | Network Security
Cyber Security Experts
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
AVEVA
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
Aruba, a Hewlett Packard Enterprise company
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
BluechipComputerSyst
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
Rasool Irfan
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
Mohammed Abdul Lateef
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET Journal
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Vignesh Suresh
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
softwaretrainer2elys
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdf
itconsultancynj104
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1
KowsalyaS12
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
kkhhusshi
 
Security standard
Security standardSecurity standard
Security standard
lyndyv
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
Shah Sheikh
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
ssuser06c4a6
 
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
IT AMC Support Dubai - Techno Edge Systems LLC
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 

Similar to Policy (20)

Wireless Network Assessment | Network Security
Wireless Network Assessment | Network SecurityWireless Network Assessment | Network Security
Wireless Network Assessment | Network Security
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
 
How to create a secure network architecture.pdf
How to create a secure network architecture.pdfHow to create a secure network architecture.pdf
How to create a secure network architecture.pdf
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Security standard
Security standardSecurity standard
Security standard
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

More from lyndyv

Datarate
DatarateDatarate
Datarate
lyndyv
 
Logging
LoggingLogging
Logging
lyndyv
 
Capacity
CapacityCapacity
Capacity
lyndyv
 
Auth and association
Auth and associationAuth and association
Auth and association
lyndyv
 
Dhcp
DhcpDhcp
Dhcp
lyndyv
 
Port forward
Port forwardPort forward
Port forward
lyndyv
 
Nat
NatNat
Nat
lyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
lyndyv
 
Firewall
FirewallFirewall
Firewall
lyndyv
 
Csmaca
CsmacaCsmaca
Csmaca
lyndyv
 
Basic config
Basic configBasic config
Basic config
lyndyv
 
Service set
Service setService set
Service set
lyndyv
 
Signals1
Signals1Signals1
Signals1
lyndyv
 
Modulation
ModulationModulation
Modulation
lyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
lyndyv
 
Wireless components
Wireless componentsWireless components
Wireless components
lyndyv
 

More from lyndyv (16)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Capacity
CapacityCapacity
Capacity
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Policy

  • 1. Netiquette is the social code of using network communications. ◦ A social code defines behaviour rules for people using the internet, and wired and wireless LANs ◦ The social code defines good manners so that non-violent communications can be achieved and everyone is served  A security policy is a collection of policies that specify how security is implemented and managed for a business ◦ It includes configuration details such as protocols used, port forwarding rules, how data is logged, how passwords are created and maintained and the change process. ◦ It includes physical security such as locks, security cameras and access systems ◦ It includes rules about applications and business processes ◦ It includes how employees behave when accessing the wired and wireless lan and internet. This is defined in the Acceptable Use Policy
  • 2. Securing the Wlan must use a Defence in Depth strategy ◦ Have multiple security measures implemented, multiple layers of security controls  Reduce the Service Set Area – the signal range ◦ Reduce power levels (not all equipment can do this) to contain signals within business boundaries  SSID cloaking ◦ Disable SSID broadcasts from Access Points  Mac address filtering ◦ Filter host joining the Wlan by Mac address  Implement the strongest security standard you can ◦ WPA2 or WPA if equipment is older with long passphrases  Create a security policy that mandates configuration and acceptable use ◦ Educate users and make them accountable  Monitor Wlans for threats and abnormal behaviour ◦ Implement logging, intrusion prevention systems