Proceedings From the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005.
DOI: 10.1109/iaw.2005.1495946
|View full text |Cite
|
Sign up to set email alerts
|

Wireless security policy development for sensitive organizations

Abstract: As the benejiis of wireless technology draw organizations into employing their own wireless networks, the issue of security has become increasingly important. Wireless networks pose their own distinct security challenges to those organizations, which adopt the technology. This paper is Hot a review of the various technological wireless security measures; rather, this paper's focus is the examination of wirekss security policy, The goal of this paper is to make the reader aware of the weakness in current wirele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Less than half of wireless networks are well configured and are running correctly. In addition to that most APs default settings do not implement any type of encryption or authentication [9].…”
Section: Best Practicesmentioning
confidence: 98%
See 2 more Smart Citations
“…Less than half of wireless networks are well configured and are running correctly. In addition to that most APs default settings do not implement any type of encryption or authentication [9].…”
Section: Best Practicesmentioning
confidence: 98%
“…In this situation a security policy must be described and written down to allow managers as well as technicians to react correctly to undesired circumstances [9]. It is not surprising that the main reason for security breaches is the human error factor or what is also known as social engineering, where the network security is shared or revealed intentionally or unintentionally to unwanted parties.…”
Section: Security Policymentioning
confidence: 99%
See 1 more Smart Citation
“…An early study explains wireless network security as a combination of wireless channel security and network security [6]. Many challenges of the wireless network exists like the jamming of radio frequency signals using an attack called Denial of Service (DOS) which interferes with transmission over the wireless network [11]. A major reason for the success of most of this attacks has been due to the loopholes present in existing wireless network security protocols [15].…”
Section: Technical Wireless Network Challenges and Solutionsmentioning
confidence: 99%
“…Manley et al [11] pointed out a major security concern with wireless security: they stated that 70% of the data transmitted through wireless access points is unencrypted. They proposed a framework of a reliable wireless security policy and examined the wireless security policies of the Department of Defense based on their framework.…”
Section: Policy Refinementmentioning
confidence: 99%