Wireless Local Area Network Deployment and Security Practices
|
|
|
- Cleopatra Garrison
- 10 years ago
- Views:
Transcription
1 HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number
2 HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective telecommunication infrastructure that includes a wireless local area network. This network helps link about 32,000 facilities and enable communication among hundreds of thousands of employees and systems. The Postal Service is expanding its wireless infrastructure to provide mobile connectivity in delivery units to support new applications and enhance its competitiveness in the package delivery business. Wireless technology offers multiple benefits such as increased mobility and ease of use; however, wireless networks are easy to compromise if improperly installed, increasing the risk that the confidentiality, integrity, and availability of information systems and data will be compromised. Attackers who gain unauthorized access to wireless networks can obtain sensitive information, conduct fraudulent activities, harm networks and systems, and disrupt operations. Our objectives were to determine whether the Postal Service has effective security policies and controls in place to detect unauthorized use of and access to its wireless network, and whether the expansion plans for its wireless infrastructure follow established policy and security standards. The vice president, Information Technology, requested this audit. April 24, 2014 Wireless Local Area Network Deployment and Report Number WHAT THE OIG FOUND: We determined the Postal Service implemented adequate security policies and controls that effectively detect unauthorized use of and access to its wireless network. Specifically, the Postal Service has configured its wireless controller devices and access points to continuously monitor and detect unauthorized access. Our wireless network discovery scans at all five facilities we reviewed did not identify any wireless access points that we considered a threat to the network, such as those installed without the network administrator s consent. In addition, the current expansion plans for the wireless infrastructure follow established policy and security standards, and security procedures in place are effective to ensure new wireless technologies are authorized, evaluated, and assessed prior to deployment. WHAT THE OIG RECOMMENDED: Because the Postal Service has effective security policies and controls for managing its wireless network infrastructure and technology, we are not making any recommendations. Link to review the entire report
3 April 24, 2014 MEMORANDUM FOR: JOHN T. EDGAR VICE PRESIDENT, INFORMATION TECHNOLOGY FROM: SUBJECT: John E. Cihota Deputy Assistant Inspector General for Financial and Systems Accountability Audit Report Wireless Local Area Network Deployment and (Report Number ) This report presents the results of our audit of the U.S. Postal Service s Wireless Local Area Network Deployment and (Project Number 13BG021IT000). We appreciate the cooperation and courtesies provided by your staff. If you have any questions or need additional information, please contact Sean D. Balduff, acting director, Information Technology, or me at Attachment cc: Corporate Audit and Response Management
4 TABLE OF CONTENTS Introduction... 1 Conclusion... 1 Wireless Local Area Network Security Policies and Controls... 2 Recommendations... 3 Appendix A: Additional Information... 4 Background... 4 Objectives, Scope, and Methodology... 5 Prior Audit Coverage... 7 Appendix B: Wireless Scan Analysis... 8
5 Introduction This report presents the results of our audit of the U.S. Postal Service s Wireless Local Area Network (WLAN) Deployment and (Project Number 13BG021IT000). Our objectives were to determine whether the Postal Service has effective security policies and controls to detect unauthorized use of and access to its wireless networks and to determine whether the approved expansion plan for its wireless infrastructure follows established policy and security standards. The vice president, Information Technology, requested we review the Postal Service s WLAN. See Appendix A for additional information about this audit. The Postal Service has an extensive data and voice telecommunication infrastructure that links about 32,000 facilities and enables communication among hundreds of thousands of employees and systems. This infrastructure includes communication networks and organization-wide computing systems. The communication networks include WLAN, local area networks (LAN), Internet, 1 Intranet, 2 Extranet, 3 Virtual Private Networks (VPN), 4 and all landline and wireless voice and data communication services. To enhance its competitiveness in the package delivery business, the Postal Service implemented the Delivery Unit Infrastructure Technology (DUIT) Program. 5 This program expands wireless network capabilities at delivery units to provide mobile connectivity for several applications currently scheduled for deployment. Under this program, the Postal Service will install 18,857 wireless access points (AP) 6 at 11,857 delivery units. The expansion will provide key technologies necessary for successful implementation of Delivery, Results, Innovation, Value and Efficiency (DRIVE) Initiative 43, Build a World-Class Packaging Platform, and DRIVE Initiative 20, Achieve 100 Percent Product Visibility. Conclusion The Postal Service has effective security policies and controls that detect unauthorized access to its wireless network, 7 and the current expansion plans for its wireless infrastructure follow established policy and security standards. 8 To provide network and data security against unauthorized access and attacks, 9 the Postal Service 1 A worldwide system of computer networks. 2 A private network contained within an organization and only accessible by the organization s employees. 3 A private network that shares part of an organization s information or operations with suppliers, customers, or vendors. 4 VPN encrypts data sent through the network. 5 Decision Analysis Report, DUIT Program, October 9, A device that allows wireless devices to connect to a network. 7 Handbook AS-805, Information Security, Section 11, Network Security, dated May Handbook AS-805, Section 11, and Handbook AS-805-D, Information Security Network Connectivity Process, dated September A network attack occurs when an attacker or hacker uses certain methods or technologies to use, corrupt, or steal data for malicious purposes. 1
6 implemented standardized configurations for its wireless network APs. To improve wireless network monitoring, the Postal Service implemented a that detects unauthorized access, unauthorized configuration changes, and other security incidents. Finally, to protect the network infrastructure, the Postal Service has effective security policies in place to ensure new wireless technology is authorized, evaluated, and assessed before deployment. Effective security controls increase the probability the Postal Service will detect and prevent unauthorized access to its network that could impair the confidentiality, integrity, and availability of information systems and data. Wireless Local Area Network Security Policies and Controls Our audit determined that controls over the wireless network and technology were generally in place and effective. Specifically: Wireless networks and APs are configured to monitor and detect unauthorized use and access. The Postal Service uses a to centrally manage and configure its wireless network and Integrated configuration templates are used to apply common and best-practice configuration settings for encryption, authentication, authorization, and accounting. We conducted wireless network scans at five facilities 13 to detect rogue APs. 14 We identified out of total APs that were not on the approved inventory list. 15 After further analysis, we discovered that of the unknown APs were We validated that the were an approved Postal Service AP and did not pose a security threat. We analyzed the remaining unknown APs and determined they were not rogue APs. For example, these APs included mobile hotspots 18 and the APs of surrounding businesses. Therefore, they did not pose a risk to the network infrastructure. See Table 1 for details of this analysis. Raleigh, NC, Processing and Distribution Center (P&DC); St. Paul, MN, P&DC; Minneapolis, MN, P&DC, and the Any wireless AP that has been installed on a network s wired infrastructure without the consent of the network administrator or owner. 15 Inventory listing of all APs connected to the Postal Service network as of November 25, A secondary Wi-Fi hotspot created within a physical AP. 17 The ability of a computer application or product to continue to function well when its size or volume is changed to meet a user s needs. 18 A portable cellular data modem that is combined with a Wi-Fi router. 2
7 The Postal Service employs continuous monitoring technology and procedures to ensure the wireless network is secure. This technology includes. Larger Postal Service facilities have dedicated APs configured for wireless intrusion detection. Smaller facilities employ APs that his technology scans and analyzes the wireless network to detect unauthorized access and identify incidents for investigation and resolution by Telecommunication Services. 19 Based on limited testing of completed sites, 20 we determined that Telecommunication Services ensured wireless technologies installed as part of the DUIT Program were authorized, evaluated, and assessed prior to deployment and were in compliance with established security policies and procedures. As of February 11, 2014, wireless installation was completed for 2,769 of 11,857 delivery units in the program This installation supports several applications scheduled for deployment: o o o Telecommunication Services implemented the WLAN tracking database to manage the wireless infrastructure expansion under the DUIT Program. The database contains the deployment status for each application as well as site survey data 24 for individual sites, which allows Telecommunication Services to track the progress of each individual program. See Table 2 for the DUIT Program status. Recommendations Security controls over the Postal Service wireless network infrastructure are in place and effective; therefore, we are issuing this report without any recommendations. The Postal Service informally reviewed a draft of this report and had no comments or concerns. 19 A part of the Enterprise Access Infrastructure group, which manages all access to information technology infrastructure, provides operational support, and provides deployment and strategic direction for the Postal Service. 20 Selected sites were post offices located in Arlington, WA; Menomonee Falls, WI; Long Point, TX; North Shepherd, TX; and Watsonville, CA. 21 An overhead camera-based solution that provides hands-free scanning, image capture, and revenue protection functionality at larger delivery units. 22 DSS consists of an Advanced Computing Environment (ACE) laptop paired with a ring scanner and Bluetooth headset used at smaller delivery units. 23 A mobile device used to process simple transactions for customers in the lobby rather than at the retail counter. 24 A wireless site survey is part of the review and approval process. Site surveys are performed to obtain maximum benefits of the wireless devices and maintain appropriate security. The survey results are used to place APs, offer channel sections, etcetera. 3
8 Appendix A: Additional Information Background Wireless networks allow organizations to extend their LANs to support a mobile workforce. Devices with wireless capabilities such as laptops and smart phones are able to communicate and use computing resources without physically connecting to a network. WLANs are groups of wireless networking devices within a limited geographic area that exchange data through radio communications. WLANs are an extension of the existing wired network and must permit secure, encrypted, authorized communication with access to data, communication, and business services as if connected to the LAN. WLANs must: Maintain accessibility to resources while employees are not connected to a wired network. Secure the enterprise from unauthorized, unsecured, or rogue APs. Extend the full benefits of integrated network services 25 to nomadic users. 26 Segment authorized users and block unauthorized users. Easily deploy, operate, and manage central or remote APs. Contain wireless threats, enforce security policy compliance, and safeguard information through enhanced security services such as WLAN Intrusion Prevention Systems and Intrusion Detection Systems. Simultaneously track thousands of Wi-Fi and active Radio Frequency Identification 27 devices from directly within the WLAN infrastructure for critical applications (location services). Provide customers, vendors, and partners with easy access to wired and wireless LANs (guest access). One of the primary components of a WLAN is an AP that transmits and receives data. These APs allow wireless devices to connect to a wired network using Wi-Fi or related standards, and can serve as the interconnecting point between the WLAN and a fixed wired network. In contrast, a rogue AP is any Wi-Fi access point installed on a network but not authorized for operation on that network, and not under network administrator management. Rogue APs do not conform to WLAN security policies and can allow 25 Integrated network services support data, voice, and different networking protocols. 26 Nomadic users are computer users who can freely move in an environment without carrying a computing device, using the devices present in the environment. 27 A technology that incorporates the use of electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum to uniquely identify an object. 4
9 anyone with a Wi-Fi device to connect to a network, bypassing the normal security policies. Telecommunication Services is responsible for managing the Postal Service network. Network administrators and engineers own all network components and oversee all connections to the network. Telecommunication Services uses the for network security, deployment, management, and control issues. This solution integrates to automate wireless network planning, configuration, and management functions. Another tool in the unified wireless network solution is the which allows Telecommunication Services to monitor network activity and provide real-time reporting for network statistics and alarms. 29 Objectives, Scope, and Methodology Our audit objectives were to determine whether the Postal Service has effective security policies and controls in place to detect unauthorized use and access to its wireless networks, and to determine whether the current approved expansion plan for its wireless infrastructure follows established policy and security standards. To accomplish our objectives, we: Interviewed Postal Service officials in Telecommunication Services and members of the Computer Incident Response Team (CIRT) 30 to identify policies and procedures for managing, configuring, and monitoring a wireless network infrastructure and its components. Judgmentally selected five facilities at which to conduct wireless network scans to detect unauthorized APs and devices. We conducted the scans using the. 31 The five facilities we selected were the: o Raleigh, NC, P&DC. o. o St. Paul, MN, P&DC. o Minneapolis, MN, P&DC. o. An event is an occurrence or detection of some condition in and around the network. An alarm is a response to one or more related events. If an event is considered of high enough severity (critical, major, minor, or warning), the raises an alarm until the resulting condition no longer occurs. 30 CIRT is responsible for providing an immediate and effective response to computer security incidents as they occur. 5
10 Obtained an inventory of approved wireless APs and compared data for each of our sampled facilities. Identified and analyzed unknown APs that were not on the approved inventory list and verified that they were not a threat to the Postal Service network. Reviewed standard configuration settings for wireless APs and workgroup bridge. 32 Reviewed the wireless network security incidents 33 investigated by the CIRT that occurred between October 1, 2013, and February 18, 2014; and verified procedures for monitoring, detecting, and documenting security incidents. Obtained documentation for the 2,796 sites completed under the wireless infrastructure expansion project. Selected the five completed sites 34 under the DUIT- PASS Phase 2 and verified that wireless technologies were authorized, evaluated, and assessed prior to deployment. We conducted this performance audit from August 2013 through April 2014, in accordance with generally accepted government auditing standards and included such tests of internal controls as we considered necessary under the circumstances. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objective. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We assessed the reliability of wireless networks inventory data by performing scans of wireless networks, reviewing and analyzing the resultant data, and interviewing knowledgeable officials. We determined that the data were sufficiently reliable for the purposes of this report. 32 A small stand-alone unit that can provide a wireless infrastructure connection for ethernet-enabled devices. Arlington, WA; Menomonee Falls, WI; Long Point, TX; North Shepherd, TX; and Watsonville, CA. 6
11 Prior Audit Coverage The U.S. Postal Service Office of Inspector General (OIG) did not identify any prior audits or reviews related to the objective of this audit. 7
12 Appendix B: Wireless Scan Analysis Table 1. Facility Raleigh P&DC Postal Service Approved APs OIG Scanned APs Postal Service Virtual APs Total Authorized APs Total Unknown APs St. Paul P&DC Minneapolis P&DC Totals Source: Wireless network scans conducted October through December 2013, and Telecommunication Services AP Inventory listing. Our scans identified APs at the five facilities. This total includes approved APs and that were not in inventory. Based on further analysis of the APs, we identified APs that increased the total authorized APs to. Our final analysis determined that none of the remaining APs we discovered were attached to the network; therefore, we did not identify any rogue APs that were a threat to the network. Table 2. Status of Delivery Unit Wireless Capability Deployment Programs Status of AP Installations Totals Percentage Cancelled % Completed 539 1, ,012 2, % Exception % In Progress % New 1, , % On Hold % Pending % Rescheduled % Scheduled % Totals 593 3, ,038 5, % Percentage 10.3% 62.5% 8.3% 0.9% 18.0% 100.0% Source: WLAN Project Tracking Report dated February 11,
13 According to the DUIT program, 18,857 wireless APs will be installed in delivery units to support the applications. This connectivity is capable of supporting multiple devices at the same time and providing adequate bandwidth for the applications listed. These APs will be centrally managed and supported, and designed to allow only Postal Service devices to connect to the network infrastructure. Once AP installation is complete under the DUIT program, any future applications that need wireless capability will have it. 9
Hardware Inventory Management Greater Boston District
Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Capital District Vulnerability Assessment
Capital District Vulnerability Assessment Audit Report Report Number IT-AR-15-1 December 12, 214 These vulnerabilities expose the infrastructure to unauthorized remote access by potential attackers who
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Software Inventory Management Greater Boston District
Software Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-007 July 13, 2015 Highlights Effective software management practices are not in place to adequately protect and
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
Software Contract and Compliance Review
Audit Report Report Number IT-AR-15-009 September 18, 2015 Software Contract and Compliance Review The software contract did not comply with all applicable standards and management did not ensure the supplier
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Security Controls Over Wireless Technology Were Generally in Place; However, Further Actions Can Improve Security September 26, 2011 Reference Number:
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY. Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost
July 14, 2015 MEMORANDUM FOR: JUDITH A. ADAMS ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY FROM: SUBJECT: Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance
WHITEPAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility
Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
Why Migrate to the Cisco Unified Wireless Network?
Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2010 AirTight Networks, Inc. All rights reserved. Introduction Last few years
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Instructions for Completing the Information Technology Officer s Questionnaire
Instructions for Completing the The (Questionnaire) contains questions covering significant areas of a bank s information technology (IT) function. Your responses to these questions will help determine
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
Wireless (In)Security Trends in the Enterprise
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc. All rights reserved. WiFi is proliferating fast.
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Ensuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
The Cisco Mobility Express Solution
The Cisco Mobility Express Solution A business-grade, affordable mobility solution for small and medium-sized businesses with up to 250 employees. Executive Summary This document presents the Cisco Mobility
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance
WHITE PAPER Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance The objective of this white paper is to
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Don t Let Wireless Detour Your PCI Compliance
Understanding the PCI DSS Wireless Requirements A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc.
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
August 20, 2014 MEMORANDUM FOR: CHARLES L. MCGANN, JR. MANAGER, CORPORATE INFORMATION SECURITY FROM: for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
Wireless Security Strategies for 802.11ac and the Internet of Things
339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2014 AirTight Networks, Inc. All rights reserved. The Internet of Things is a double-edged sword. While it confers many
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
XX-XXX Wireless Local Area Network Guidelines. Date: August 13, 2003 Date Adopted by NITC: Other:
Nebraska Information Technology Commission TECHNICAL STANDARDS AND GUIDELINES Wireless Local Area Network Guidelines Category Title Number Security Architecture Wireless Local Area Network Guidelines Applicability
G-Cloud Service Definition. Atos Information Security Wireless Scanning Service
G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
Parcel Readiness Product Tracking and Reporting System Controls
Parcel Readiness Product Tracking and Reporting System Controls Audit Report Report Number IT-AR-5-002 December 6, 204 The Postal Service needs to improve its process for managing and securing the PTR
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Security Requirements for Wireless Local Area Networks
Information Technology Security Guidance Security Requirements for Wireless Local Area Networks Overview ITSG-41 March 2013 Foreword The ITSG-41 Security Requirements for Wireless Local Area Networks document
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
PCI DSS 3.1 and the Impact on Wi-Fi Security
PCI DSS 3.1 and the Impact on Wi-Fi Security 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2015 AirTight Networks, Inc. All rights reserved. Table of Contents PCI
Wireless data communication in Control Systems
Rules, standards and challenges for class Ståle Sneen Index DNV / class systematics Rules, standards Challenges and future work 2 DNV / class systematics 3 More than 140 years of managing risk Det Norske
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
Standard: Network Security
Standard: Network Security Page 1 Executive Summary Network security is important in the protection of our network and services from unauthorized modification, destruction, or disclosure. It is essential
UTMB INFORMATION RESOURCES PRACTICE STANDARD
IR Security Glossary Introduction Purpose Applicability Sensitive Digital Data Management Privacy Implications This abbreviated list provides explanations for typically used Information Resources (IR)
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Air Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire
Institution Charter Date of Exam Prepared By INFORMATION TECHLOGY OFFICER S QUESTIONNAIRE Instructions for Completing the Information Technology Examination Officer s Questionnaire The Information Technology
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
