SlideShare a Scribd company logo
1 of 3
Download to read offline
Wireless Communication Standard
1 Overview
The purpose of this standard is to secure and protect the information assets owned by
<Company Name>. <Company Name> provides computer devices, networks, and
other electronic information systems to meet missions, goals, and initiatives.
<Company Name> grants access to these resources as a privilege and must manage
them responsibly to maintain the confidentiality, integrity, and availability of all
information assets.
This standard specifies the technical requirements that wireless infrastructure devices
must satisfy to connect to a <Company Name> network. Only those wireless
infrastructure devices that meet the requirements specified in this standard or are
granted an exception by the Information Security Team are approved for
connectivity to a <Company Name> network.
2 Scope
All employees, contractors, consultants, temporary and other workers at <Company
Name>, including all personnel affiliated with third parties that maintain a wireless
infrastructure device on behalf of <Company Name> must adhere to this standard.
This standard applies to all wireless infrastructure devices that connect to a
<Company Name> network or reside on a <Company Name> site that provide
wireless connectivity to endpoint devices including, but not limited to, laptops,
desktops, cellular phones, and personal digital assistants (PDAs). This includes any
form of wireless communication device capable of transmitting packet data.
The <Company Name> Information Security Team must approve exceptions to this
policy in advance.
3 Statement of Requirements
3.1 General Requirements
All wireless infrastructure devices that connect to a <Company Name> network or
provide access to <Company Name> Confidential, <Company Name> Highly
Confidential, or <Company Name> Restricted information must:
3.1.1 Use Extensible Authentication Protocol-Fast Authentication via Secure
Tunneling (EAP-FAST), Protected Extensible Authentication Protocol
(PEAP), or Extensible Authentication Protocol-Translation Layer Security
(EAP-TLS) as the authentication protocol.
3.1.2 Use Temporal Key Integrity Protocol (TKIP) or Advanced Encryption
System (AES) protocols with a minimum key length of 128 bits.
2
3.2 Lab and Isolated Wireless Device Requirements
3.2.1 Lab device Service Set Identifier (SSID) must be different from <Company
Name> production device SSID.
3.2.2 Broadcast of lab device SSID must be disabled.
3.3 Home Wireless Device Requirements
All home wireless infrastructure devices that provide direct access to a <Company
Name> network, such as those behind Enterprise Teleworker (ECT) or hardware
VPN, must adhere to the following:
3.3.1 Enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST,
PEAP, or EAP-TLS
3.3.2 When enabling WPA-PSK, configure a complex shared secret key (at least
20 characters) on the wireless client and the wireless access point
3.3.3 Disable broadcast of SSID
3.3.4 Change the default SSID name
3.3.5 Change the default login and password
4 References
In support of this standard, the following policies, guidelines, and resources are
included:
Information Sensitivity Policy
Wireless Communication Policy
5 Enforcement
This standard is part of the Wireless Communication Policy and failure to conform to
the standard is a violation of the policy. Any employee found to have violated the
policy may be subject to disciplinary action, up to and including termination of
employment. Any violation of the policy by a temporary worker, contractor or
vendor may result in the termination of their contract or assignment with <Company
Name>.
6 Definitions
Term Definition
3
AES Advanced Encryption System
<Company Name>
network
A wired or wireless network including indoor, outdoor, and
alpha networks that provide connectivity to corporate services.
Corporate connectivity
A connection that provides access to a <Company Name>
network.
EAP-FAST
Extensible Authentication Protocol-Fast Authentication via
Secure Tunneling: authentication protocol for wireless
networks.
EAP-TLS
Extensible Authentication Protocol-Translation Layer
Security, used to create a secured connection for 802.1X by
pre-installing a digital certificate on the client computer.
Enterprise Class
Teleworker (ECT)
An end-to-end hardware VPN solution for teleworker access
to the <Company Name> network.
Information assets
Information that is collected or produced and the underlying
hardware, software, services, systems, and technology that is
necessary for obtaining, storing, using, and securing that
information which is recognized as important and valuable to
an organization.
PEAP
Protected Extensible Authentication Protocol, a protocol used
for transmitting authentication data, including passwords, over
802.11 wireless networks
Service Set Identifier
(SSID)
A set of characters that give a unique name to a wireless local
area network.
TKIP
Temporal Key Integrity Protocol, an encryption key that's part
of WPA.
WPA-PSK WiFi Protected Access pre-shared key
7 Revision History
Date of
Change
Responsible Summary of Change

More Related Content

What's hot

Firewall
FirewallFirewall
FirewallApo
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architecturesArun Mahajan
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewallMd Shihab
 
network security / information security
network security / information securitynetwork security / information security
network security / information securityRohan Choudhari
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015mauimarketing
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Wireless security
Wireless securityWireless security
Wireless securitySalma Elhag
 

What's hot (19)

Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
All About VPN
All About VPNAll About VPN
All About VPN
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Firewall
FirewallFirewall
Firewall
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Wireless security
Wireless securityWireless security
Wireless security
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 

Similar to Wireless communication standard

IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Network Support Services
Network Support ServicesNetwork Support Services
Network Support ServicesElena Benson
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for HealthcareSteve Dunn
 

Similar to Wireless communication standard (20)

CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
Cdi federal 2019
Cdi federal 2019Cdi federal 2019
Cdi federal 2019
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Network Support Services
Network Support ServicesNetwork Support Services
Network Support Services
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
SECURE Out-of-Band Management
SECURE Out-of-Band ManagementSECURE Out-of-Band Management
SECURE Out-of-Band Management
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Wireless communication standard

  • 1. Wireless Communication Standard 1 Overview The purpose of this standard is to secure and protect the information assets owned by <Company Name>. <Company Name> provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives. <Company Name> grants access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all information assets. This standard specifies the technical requirements that wireless infrastructure devices must satisfy to connect to a <Company Name> network. Only those wireless infrastructure devices that meet the requirements specified in this standard or are granted an exception by the Information Security Team are approved for connectivity to a <Company Name> network. 2 Scope All employees, contractors, consultants, temporary and other workers at <Company Name>, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of <Company Name> must adhere to this standard. This standard applies to all wireless infrastructure devices that connect to a <Company Name> network or reside on a <Company Name> site that provide wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones, and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data. The <Company Name> Information Security Team must approve exceptions to this policy in advance. 3 Statement of Requirements 3.1 General Requirements All wireless infrastructure devices that connect to a <Company Name> network or provide access to <Company Name> Confidential, <Company Name> Highly Confidential, or <Company Name> Restricted information must: 3.1.1 Use Extensible Authentication Protocol-Fast Authentication via Secure Tunneling (EAP-FAST), Protected Extensible Authentication Protocol (PEAP), or Extensible Authentication Protocol-Translation Layer Security (EAP-TLS) as the authentication protocol. 3.1.2 Use Temporal Key Integrity Protocol (TKIP) or Advanced Encryption System (AES) protocols with a minimum key length of 128 bits.
  • 2. 2 3.2 Lab and Isolated Wireless Device Requirements 3.2.1 Lab device Service Set Identifier (SSID) must be different from <Company Name> production device SSID. 3.2.2 Broadcast of lab device SSID must be disabled. 3.3 Home Wireless Device Requirements All home wireless infrastructure devices that provide direct access to a <Company Name> network, such as those behind Enterprise Teleworker (ECT) or hardware VPN, must adhere to the following: 3.3.1 Enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST, PEAP, or EAP-TLS 3.3.2 When enabling WPA-PSK, configure a complex shared secret key (at least 20 characters) on the wireless client and the wireless access point 3.3.3 Disable broadcast of SSID 3.3.4 Change the default SSID name 3.3.5 Change the default login and password 4 References In support of this standard, the following policies, guidelines, and resources are included: Information Sensitivity Policy Wireless Communication Policy 5 Enforcement This standard is part of the Wireless Communication Policy and failure to conform to the standard is a violation of the policy. Any employee found to have violated the policy may be subject to disciplinary action, up to and including termination of employment. Any violation of the policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with <Company Name>. 6 Definitions Term Definition
  • 3. 3 AES Advanced Encryption System <Company Name> network A wired or wireless network including indoor, outdoor, and alpha networks that provide connectivity to corporate services. Corporate connectivity A connection that provides access to a <Company Name> network. EAP-FAST Extensible Authentication Protocol-Fast Authentication via Secure Tunneling: authentication protocol for wireless networks. EAP-TLS Extensible Authentication Protocol-Translation Layer Security, used to create a secured connection for 802.1X by pre-installing a digital certificate on the client computer. Enterprise Class Teleworker (ECT) An end-to-end hardware VPN solution for teleworker access to the <Company Name> network. Information assets Information that is collected or produced and the underlying hardware, software, services, systems, and technology that is necessary for obtaining, storing, using, and securing that information which is recognized as important and valuable to an organization. PEAP Protected Extensible Authentication Protocol, a protocol used for transmitting authentication data, including passwords, over 802.11 wireless networks Service Set Identifier (SSID) A set of characters that give a unique name to a wireless local area network. TKIP Temporal Key Integrity Protocol, an encryption key that's part of WPA. WPA-PSK WiFi Protected Access pre-shared key 7 Revision History Date of Change Responsible Summary of Change