Objective: This policy aims to protect wireless communication networks at the university and ensure the security of circulating data and information.
Scope: The policy covers wireless and satellite communications networks, as well as third-party networks connected to the university’s private network, including servers, routers, firewalls, and other components.
Policy Details:
- Network Isolation: Recommended to isolate the university network from the Internet unless secured with appropriate hardware and software.
- Use of Encryption Devices: Mandatory use of encryption between network connection points.
- Encryption Protocols: Latest encryption protocols should be used as per network sensitivity.
- Avoiding Frequency Interference: Use licensed frequencies to minimize interference.
- Securing the Physical Environment: Protect network towers from tampering and sabotage.
- Authentication Protocols: Use the latest authentication protocols and complex passwords to secure networks.
Detailed Simulation of Wireless Network Policy:
Case 1: Acceptable Example
- The university’s network is isolated and uses WPA3 encryption, licensed frequencies, physical security measures, and strong passwords with regular updates.
Case 2: Unacceptable Example
- A student created an unsecure open access point, leading to vulnerabilities due to lack of network isolation, no encryption, weak physical security, and a simple password.
Outcomes:
- Positive (University): Enhanced trust and data protection.
- Negative (Student): Risks of data leakage and account hacking.
Conclusions: Adherence to wireless network policy is crucial. All users must follow standards to ensure security and data protection.
Recommendations:
- Training and Awareness: Implement training programs on wireless security.
- Network Monitoring: Establish mechanisms for periodic network monitoring.
- Update Policies: Regularly update policies to address evolving security threats.
Read more articles
Newer
Older