Chapter 13. Wireless Security Policies

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • General policy

    • Policy creation

    • Policy management

  • Functional policy

    • Password policy

    • RBAC policy

    • Change control policy

    • Authentication and encryption policy

    • WLAN monitoring policy

    • Endpoint policy

    • Acceptable use policy

    • Physical security policy

    • Remote office policy

  • Government and industry regulations

    • Department of Defense (DoD) Directive 8100.2

    • Federal Information Processing Standards (FIPS 140-2)

    • Sarbanes Oxley (SOX)

    • Graham-Leach-Bliley Act (GLBA)

    • Health Insurance Portability and Accountability Act (HIPAA)

    • Payment Card Industry (PCI) Standard

    • Compliance reports

  • 802.11 WLAN Policy Recommendations

In addition to an organization's budget and internal acceptable use policies, there are ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.