Preview

Wireless Security Policy Paper

Better Essays
Open Document
Open Document
1375 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Security Policy Paper
Week 8 Wireless Security Polices for Banking
Robert Cole Smith
Dr. E. Otto
Cis 513
11/27/2014

Write a four to six (4-6) page wireless security policy for a medium-sized banking organization using the following structure
Wireless Security Policy Overview A wireless policy for a medium-sized banking organization will need to deploy a wireless LAN to the network and there will not need to be onsite IT staff as that can be outsourced to various vendors and business specializing in such. The remote access can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system. The Network infrastructure that will be in use will integrate
…show more content…
Program policies: addresses overall IT security goals and it should apply to all IT resources within an institution. The institution’s president or an appointed representative must direct policy development to ensure that the policies address the IT security goals of all systems operating within the institution. For instance, program policies can address confidentiality or service availability. All program policies should meet the following criteria: Comply with existing laws, regulations, and state and federal policies. Support and enforce the institution’s mission statement and organizational structure. The components of an adequate program policy are defined as System-specific policies: addresses the IT security issues and goals of a particular system. Large facilities may have multiple sets of system-specific policies that address all levels of security from the very general to the particular (system permissions that reflect the segregation of duties among a group of employees). Issue-specific polices will address particular IT security issues such as, Internet access, installation of unauthorized software or equipment, and sending/receiving e-mail attachments. Complying with regulations such as: The Health Insurance Portability and Accounting Act, The Gramm-Leach-Bliley Act , The Sarbanes-Oxley Act , and Massachusetts 201 CMR 17.00, …show more content…
Financial institutions should actively monitor and notify security alert organizations for notices related to their wireless application services. Banks should also consider divulging informationto customers when wireless Internet devices that require the use of communications protocols deemed insecure will no longer be supported by the institution. The financial institution should consider having regular independent security testing performed on its wireless customer access application. Specific testing goals would include the verification of appropriate security settings, the effectiveness of the wireless application security implementation and conformity to the institution 's stated standards. The security testing should be performed by an organization that is technically qualified to perform wireless testing and demonstrates appropriate ethical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA).…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    Users will report known misuse or abuse of the wireless network or associated equipment immediately to your local SST or ITT personnel.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The three main threats that face the banking industry are; Organized crime targeting financial institutions, Assault on Authentication, Malware. There are other threats that financial institutions are facing such as; Increased insider threat, Mobile Banking Attacks, and Telephone based fraud. The banking industry is facing more and more threats each day as they become more and more dependent on electronic media, this includes mobile banking, web based banking, atm machines, and any kind of information system that the bank is using. With the rise in technology and banking adapting to the technology banks become vulnerable and constantly have to keep up to date on all security measures and sometimes even invent new ways of protecting the banks data as well as its customers data.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    The wireless technologies have spread almost everywhere over the last few years. Their easiness of deployment and increase in speed make them very attractive for the everyday networking. On the other side the architecture makes wireless networks appealing for security attacks. The broadband wireless access technology WiMAX has been developed considering the security issues coming up with the deployment of Wi-­‐ Fi (WLAN) networks. The security tools implemented in WiMAX aim to overcome issues like access authorisation, user data privacy, and privacy key management. Security protocols in WiMAX reside in a MAC sub-­‐layer and include authentication protocols (EAP and X.509), key management protocols (PKMv2), and encryption standards (AES and 3DES).…

    • 2185 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    BofA Mobile Banking case

    • 1695 Words
    • 7 Pages

    The capabilities of mobile banking through the use of smartphones or mobile web have become popular with today’s bank customers. There are increasing overall growth in mobile banking in the financial services industry.…

    • 1695 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Advance Security Measures

    • 2708 Words
    • 11 Pages

    High-speed wireless LANs can provide the benefits of network connectivity without the restrictions of being tied to a location or tethered by wires. Wireless connections can extend or replace a wired infrastructure in situations where it is costly or prohibitive to lay cables. Portable access to wireless networks can be achieved using laptop computers and wireless NICs. This enables the user to travel to various locations and still have access to their networked data. Without wireless access, the user would have to carry clumsy cabling and find a network tap to plug into. For businesses, wireless networks give more mobility and flexibility by…

    • 2708 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.…

    • 3544 Words
    • 15 Pages
    Powerful Essays
  • Best Essays

    I. INTRODUCTION The proliferation of, and rapid advances in, technology-based systems, especially those related to the internet, are leading to fundamental changes in how companies interact with customers [1-3]. Mobile phone usage has spread in a very broad manner both in developing and developed countries. With mobile communications already as a prime case for leapfrogging traditional infrastructure, mobile banking (M-Banking) has great potential for extending the provision of financial services to unbanked people through a technology that is both familiar and widespread. One of the first commercial applications of the mobile commerce was mobile banking (m-banking) [4], [5]. The rapid growth of mobile applications has given rise to a…

    • 5514 Words
    • 23 Pages
    Best Essays
  • Satisfactory Essays

    Mobile Banking

    • 333 Words
    • 2 Pages

    Almost every person has a cell phone now and knows how to use it. In our fast-paced, ever-connected world, mobile technology is an attractive if not essential feature that banks can offer their customers. But mobile banking does not merely benefit banking customers. In terms of customer satisfaction, service costs, and security, mobile technology benefits banking institutions themselves. Customers are giving more portion of their lives to their cell phones. So financial institutions are adopting Mobile banking to fulfill customer’s needs via mobile phone. This would both be benefit for customers and financial institutions.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    E- Banking

    • 8080 Words
    • 33 Pages

    e-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable financial institution customers, individuals or businesses, to access accounts, transact business, or obtain information on financial products and services through a public or private network, including the Internet. Customers access e-banking services using an intelligent electronic device, such as a personal computer (PC), personal digital assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone telephone. While the risks and controls are similar for the various e-banking access channels, this booklet focuses specifically on Internet-based services due to the Internet’s widely accessible public network. Accordingly, this booklet begins with a discussion of the two primary types of Internet websites: informational and transactional.…

    • 8080 Words
    • 33 Pages
    Good Essays
  • Powerful Essays

    Sbi-Internet Banking

    • 17274 Words
    • 70 Pages

    There is a sea change in the media world. While most consumers see the news papers, the same magazines and listen to the same radio programs, behind this bland public exterior there is a seething world of innovation, acquisition, global partnership and divorces, births and deaths… all of it most readily interpreted as the inevitable result of the technological revolution that is in the process of merging telephones, computers, televisions in to a single all singing, all dancing magic kit that will, very possible, change all of our lives more than we can imagine some dayThere are 2 ways you can respond to this 1 is to panic, which may mean simply curling up in a corner and wishing that it would all go away. The other is to embrace the new religion with messianic fervor and go out to proclaim the millennium. I welcome you to the new emerging world of the Info-High-Way, destined to redefine the world of communications the Internet banking portal of our bank, enables its retail banking customers to operate their accounts from anywhere anytime, removing the restrictions imposed by geography and time. It 's a platform that enables the customers to carry out their banking activities from their desktop, aided by the power and convenience of the Internet Internet Banking System is a system that has been developed in order to help clients with the daily day-to-day transactions. Internet banking systems means that clients can now do banking at the leisure of their homes. Also known as online banking, the system allows both transactional and non-transactional features .Online banking or internet banking allows customers to conduct financial transactions on a secure website operated by the retail or virtual bankE banking is the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E- Banking can be defined as ³delivery of banks services to…

    • 17274 Words
    • 70 Pages
    Powerful Essays