16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

366 Chapter 16<br />

Assurance – The criticality and sensitivity of the information handled, equipment and<br />

services, and the need-to-know of personnel must be identified in order to determine the<br />

applicable security requirements. The security implementations chosen must provide<br />

adequate security protection commensurate with the criticality of the data, in accordance<br />

with the security policy.<br />

Enforcement – The security policy must be enforced throughout the life cycle of the<br />

system. All implementations of system security functions including those implemented<br />

at the subsystem level must be evaluated to ensure that they adequately enforce the<br />

requirements derived from the security policy. Each platform must be evaluated to ensure<br />

that the installed system configuration enforces the stated security policy. As a result of<br />

this evaluation, an assessment of the vulnerability can be generated. This assessment<br />

must be evaluated by the security manager or system administrator to decide if any<br />

modifications to the system must be made so that it complies with the security policy.<br />

<strong>Security</strong> best practices must be employed throughout the life cycle of a system to ensure<br />

continued compliance with the stated security policy. New system projects must have<br />

information security representatives during the planning and preliminary design stages in<br />

order to implement security into the design.<br />

16.3 Best Practice #3<br />

Create a plan for implementing your security policy.<br />

Once a security policy is established, an implementation plan should be created.<br />

Incremental, staged infrastructure improvements and new hires (if any) will help<br />

management plan for expenses and create a timetable for implementation.<br />

The implementation plan should include the following steps:<br />

1. Defining implementation guidelines. These guidelines should specify the<br />

personnel to receive security alarms and what action is to be taken, chains of<br />

command for incident escalation, and reporting requirements.<br />

2. Educating staff, customers, etc. about the security policy.<br />

3. Purchasing any needed hardware/software and hiring anyneeded personnel.<br />

4. Installing and testing equipment/software.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!