Time
2 hours 23 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello and welcome back to I t. Security policy. Still continue in Module three, The wireless security policy with myself. Troy Lemaire here on Cyber ERI
00:10
But he's learning. Objective is gonna be general requirements,
00:14
the lab and isolated wireless device requirements and then home wireless device requirements.
00:20
So if we go into the policy itself,
00:23
we're gonna see that there's an overview. Talks about how
00:26
mass explosion of smartphones and tablets pervasive wires connected is a given it any organization in secure wireless configure generation can provide an easy to open door for malicious threat actors.
00:37
The purpose of the policy is to secure and protect the information assets owned by the company
00:43
and the company grants access to these resource is as a privilege and must manage them responsibly to maintain confidentiality, integrity and availability of all information assets.
00:53
The policy specifies king conditions that wireless infrastructure bison must satisfy to connect to the network.
01:00
If you look at the scope, all the employees, contractors and basically anybody that would be affiliated with the company,
01:07
um, that maintain a wireless infrastructure device must adhere to the policy, and the policy applies to all in protective devices that connect to the company's network are reside on a company's site.
01:19
If we get into the meat of the policy, the general requirements are wireless infrastructure devices that reside at a company site
01:26
and connect to a network or provide access to information classified as confidential or above must. And this is gonna be one of those sections where you're going to want to modify things if you need to remove something, or you need to add something as things change over time.
01:42
But basically you're gonna buy by standard specified
01:45
in the water communication standard. Be installed. Supported, maintained by approved support Team
01:52
used. Approved authentication protocols use. Approve encryption protocols.
01:57
Maintain a hardware at Mac address that could be registered in tracked, not a fear with wireless access deployment. Maine time maintained by other support organizations.
02:07
If we look at lab and isolated wireless device requirements, all lab wireless infrastructure device that provide access the company confidential are above must adhere to the above section
02:20
and the lab are isolated. Wireless devices that do not provide general connectivity to the company network must be isolated from the corporate networking, ply with lab security policy
02:29
and then not affair with wireless access deployment maintained by other support
02:34
um,
02:35
organizations.
02:37
We look at the home wireless device requirements. Wireless infrastructure devices that provide direct access to the comfort network must conform to the home wireless device requirements
02:46
and then the wireless infrastructure devices that failed conform to the home wireless must be installed, a manner that prohibits direct access to the corporate network.
02:53
That's where you would use something like a VPN or some type of remote access or something where they're not actually directly connecting into your network there. Segment it off to where there's no direct access.
03:09
So in summary today, we discussed the water security policy. The general requirements
03:15
talk about lab and isolated wireless device requirements and then the home wireless device requirements.
03:23
The wireless security policy Recap question the 1st 1 All wireless infrastructure devices must use approve authentication blank and blank,
03:34
and that would be protocols and infrastructure.
03:38
Largest infrastructure devices that feel conformed to the home wireless device requirements must be installed in a manner that blank
03:45
direct access to the corporate network,
03:49
and that would be prohibits access our direct access to the corporate network
03:55
in the next lecture. We're gonna look at Bluetooth policy still part of the network policies. I look forward to seeing you in that course.
04:03
Have any questions?
04:05
Contact me through cyber message username at Troy Lemaire and, as always, thank you for attending this cyber retraining.

Up Next

Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
IT Security Officer at Acadian Ambulance
Instructor