TY - GEN
T1 - Wireless security policy development for sensitive organizations
AU - Manley, Michael E.
AU - McEntee, Cheri A.
AU - Molet, Anthony M.
AU - Park, Joon S.
PY - 2005
Y1 - 2005
N2 - As the benefits of wireless technology draw organizations into employing their own wireless networks, the issue of security has become increasingly important. Wireless networks pose their own distinct security challenges to those organizations, which adopt the technology. This paper is not a review of the various technological wireless security measures; rather, this paper's focus is the examination of wireless security policy. The goal of this paper is to make the reader aware of the weakness in current wireless security models and to lay a framework for the creation of an effective wireless security policy for sensitive organizations. Finally, we conclude with an examination of a case study, the Department of Defense, of real world implementation of wireless security policies, pointing out their deficiencies based on our proposed framework.
AB - As the benefits of wireless technology draw organizations into employing their own wireless networks, the issue of security has become increasingly important. Wireless networks pose their own distinct security challenges to those organizations, which adopt the technology. This paper is not a review of the various technological wireless security measures; rather, this paper's focus is the examination of wireless security policy. The goal of this paper is to make the reader aware of the weakness in current wireless security models and to lay a framework for the creation of an effective wireless security policy for sensitive organizations. Finally, we conclude with an examination of a case study, the Department of Defense, of real world implementation of wireless security policies, pointing out their deficiencies based on our proposed framework.
KW - Wireless Security Policy
UR - http://www.scopus.com/inward/record.url?scp=33745473511&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33745473511&partnerID=8YFLogxK
U2 - 10.1109/IAW.2005.1495946
DO - 10.1109/IAW.2005.1495946
M3 - Conference contribution
AN - SCOPUS:33745473511
SN - 0780392906
SN - 9780780392908
T3 - Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
SP - 150
EP - 157
BT - Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
T2 - 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Y2 - 15 June 2005 through 17 June 2005
ER -