Preview

Wireless Security Policy Paper

Better Essays
Open Document
Open Document
1375 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Security Policy Paper
Week 8 Wireless Security Polices for Banking
Robert Cole Smith
Dr. E. Otto
Cis 513
11/27/2014

Write a four to six (4-6) page wireless security policy for a medium-sized banking organization using the following structure
Wireless Security Policy Overview A wireless policy for a medium-sized banking organization will need to deploy a wireless LAN to the network and there will not need to be onsite IT staff as that can be outsourced to various vendors and business specializing in such. The remote access can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system. The Network infrastructure that will be in use will integrate
…show more content…
Program policies: addresses overall IT security goals and it should apply to all IT resources within an institution. The institution’s president or an appointed representative must direct policy development to ensure that the policies address the IT security goals of all systems operating within the institution. For instance, program policies can address confidentiality or service availability. All program policies should meet the following criteria: Comply with existing laws, regulations, and state and federal policies. Support and enforce the institution’s mission statement and organizational structure. The components of an adequate program policy are defined as System-specific policies: addresses the IT security issues and goals of a particular system. Large facilities may have multiple sets of system-specific policies that address all levels of security from the very general to the particular (system permissions that reflect the segregation of duties among a group of employees). Issue-specific polices will address particular IT security issues such as, Internet access, installation of unauthorized software or equipment, and sending/receiving e-mail attachments. Complying with regulations such as: The Health Insurance Portability and Accounting Act, The Gramm-Leach-Bliley Act , The Sarbanes-Oxley Act , and Massachusetts 201 CMR 17.00, …show more content…
Financial institutions should actively monitor and notify security alert organizations for notices related to their wireless application services. Banks should also consider divulging informationto customers when wireless Internet devices that require the use of communications protocols deemed insecure will no longer be supported by the institution. The financial institution should consider having regular independent security testing performed on its wireless customer access application. Specific testing goals would include the verification of appropriate security settings, the effectiveness of the wireless application security implementation and conformity to the institution 's stated standards. The security testing should be performed by an organization that is technically qualified to perform wireless testing and demonstrates appropriate ethical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Refer to the Network Security and Executive Summary sections of the Information Security Policy Template in Appendix B for the correct format for this assignment.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    Users will report known misuse or abuse of the wireless network or associated equipment immediately to your local SST or ITT personnel.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The three main threats that face the banking industry are; Organized crime targeting financial institutions, Assault on Authentication, Malware. There are other threats that financial institutions are facing such as; Increased insider threat, Mobile Banking Attacks, and Telephone based fraud. The banking industry is facing more and more threats each day as they become more and more dependent on electronic media, this includes mobile banking, web based banking, atm machines, and any kind of information system that the bank is using. With the rise in technology and banking adapting to the technology banks become vulnerable and constantly have to keep up to date on all security measures and sometimes even invent new ways of protecting the banks data as well as its customers data.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Have you ever thought about how “Romeo and Juliet” would have ended if communication was effectively used throughout the whole play? The outcome of the play would have been significantly different, and most, if not all, of the characters would still be alive. Every major event that happens is because of a miscommunication or no communication at all. In fact, the whole play is based on miscommunication. The feud between the two families causes major problems and forms the whole plot of the play.…

    • 505 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    BofA Mobile Banking case

    • 1695 Words
    • 7 Pages

    The capabilities of mobile banking through the use of smartphones or mobile web have become popular with today’s bank customers. There are increasing overall growth in mobile banking in the financial services industry.…

    • 1695 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Advance Security Measures

    • 2708 Words
    • 11 Pages

    High-speed wireless LANs can provide the benefits of network connectivity without the restrictions of being tied to a location or tethered by wires. Wireless connections can extend or replace a wired infrastructure in situations where it is costly or prohibitive to lay cables. Portable access to wireless networks can be achieved using laptop computers and wireless NICs. This enables the user to travel to various locations and still have access to their networked data. Without wireless access, the user would have to carry clumsy cabling and find a network tap to plug into. For businesses, wireless networks give more mobility and flexibility by…

    • 2708 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    I. INTRODUCTION The proliferation of, and rapid advances in, technology-based systems, especially those related to the internet, are leading to fundamental changes in how companies interact with customers [1-3]. Mobile phone usage has spread in a very broad manner both in developing and developed countries. With mobile communications already as a prime case for leapfrogging traditional infrastructure, mobile banking (M-Banking) has great potential for extending the provision of financial services to unbanked people through a technology that is both familiar and widespread. One of the first commercial applications of the mobile commerce was mobile banking (m-banking) [4], [5]. The rapid growth of mobile applications has given rise to a…

    • 5514 Words
    • 23 Pages
    Best Essays
  • Satisfactory Essays

    Mobile Banking

    • 333 Words
    • 2 Pages

    Almost every person has a cell phone now and knows how to use it. In our fast-paced, ever-connected world, mobile technology is an attractive if not essential feature that banks can offer their customers. But mobile banking does not merely benefit banking customers. In terms of customer satisfaction, service costs, and security, mobile technology benefits banking institutions themselves. Customers are giving more portion of their lives to their cell phones. So financial institutions are adopting Mobile banking to fulfill customer’s needs via mobile phone. This would both be benefit for customers and financial institutions.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    E- Banking

    • 8080 Words
    • 33 Pages

    e-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable financial institution customers, individuals or businesses, to access accounts, transact business, or obtain information on financial products and services through a public or private network, including the Internet. Customers access e-banking services using an intelligent electronic device, such as a personal computer (PC), personal digital assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone telephone. While the risks and controls are similar for the various e-banking access channels, this booklet focuses specifically on Internet-based services due to the Internet’s widely accessible public network. Accordingly, this booklet begins with a discussion of the two primary types of Internet websites: informational and transactional.…

    • 8080 Words
    • 33 Pages
    Good Essays