Wireless security policy development for sensitive organizations

Michael E. Manley, Cheri A. McEntee, Anthony M. Molet, Joon S. Park

Research output: Chapter in Book/Entry/PoemConference contribution

9 Scopus citations

Abstract

As the benefits of wireless technology draw organizations into employing their own wireless networks, the issue of security has become increasingly important. Wireless networks pose their own distinct security challenges to those organizations, which adopt the technology. This paper is not a review of the various technological wireless security measures; rather, this paper's focus is the examination of wireless security policy. The goal of this paper is to make the reader aware of the weakness in current wireless security models and to lay a framework for the creation of an effective wireless security policy for sensitive organizations. Finally, we conclude with an examination of a case study, the Department of Defense, of real world implementation of wireless security policies, pointing out their deficiencies based on our proposed framework.

Original languageEnglish (US)
Title of host publicationProceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Pages150-157
Number of pages8
DOIs
StatePublished - 2005
Externally publishedYes
Event6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
Duration: Jun 15 2005Jun 17 2005

Publication series

NameProceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Volume2005

Other

Other6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Country/TerritoryUnited States
CityWest Point, NY
Period6/15/056/17/05

Keywords

  • Wireless Security Policy

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Wireless security policy development for sensitive organizations'. Together they form a unique fingerprint.

Cite this