Establishing and Enforcing a Comprehensive Security Policy
One of the ways that small and medium enterprise (SME) organizations differ from their SOHO counterparts is that there is always a network administrator and one or more individuals responsible for the design and security of the network. Before they implement any security techniques or mechanisms, the administrator’s task is to analyze the network’s security requirements and decide on a security policy.
A security policy for an enterprise will cover every aspect of the organization’s information assets. Wireless access is only one component of a security policy document, but because it is relevant here, it will be examined in an initial high-level overview. The policy breadth and level ...
Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.