Abstract

A network security policy defines who can get into the network and who can get out. It can limit what Internet content the internal users can access, and what kind of data can cross from local to public networks. The ideas behind wireless network security are not unlike those of traditional wired networks. In terms of infrastructure, wired and wireless networks are united by very similar themes that can be applied across a broad spectrum of applications. A sound network security policy is a critical factor in securing one's network. This chapter discusses the elements, both technological and conceptual, that make up a comprehensive security policy. These components include everything from hardware to user authentication methods to the human processes for dealing with wireless equipment. The concepts covered in this chapter give the user building blocks to design a wireless networking policy. The implementation of hardware components and their software counterparts plays an important role in a network security policy, but so does enhancement of employee habits and basic security knowledge through proper training. Events that are beyond the control of a network administrator to prevent can still effectively be planned for. The concepts from this chapter provide the user with a solid start to flesh out the personal wireless network security policy.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call