Chapter 13. Wireless Security Policies
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
General policy
Policy creation
Policy management
Functional policy
Password policy
RBAC policy
Change control policy
Authentication and encryption policy
WLAN monitoring policy
Endpoint policy
Acceptable use policy
Physical security policy
Remote office policy
Government and industry regulations
Department of Defense (DoD) Directive 8100.2
Federal Information Processing Standards (FIPS 140-2)
Sarbanes Oxley (SOX)
Graham-Leach-Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry (PCI) Standard
Compliance reports
802.11 WLAN Policy Recommendations
In addition to an organization's budget and internal acceptable use policies, there are ...
Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.