Control access security: wireless LAN auditing framework

Malaysian Government agencies are gradually enhancing their ICT infrastructure. The wireless network is one of the important elements in ICT infrastructure since it is famously known for the most vulnerable area of cyber-attacks. Planning a perfect access control and security protection for wireless...

Full description

Saved in:
Bibliographic Details
Main Authors: Krishnan, Komathi, Abas, Hafiza, Mohd. Daud, Salwani, Adam, Zulkifli
Format: Article
Language:English
Published: Advanced Informatics School, Universiti Teknologi Malaysia 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/80686/1/HafizaAbas2017_ControlAccessSecurityWirelessLAN.pdf
http://eprints.utm.my/id/eprint/80686/
http://publication.ais.utm.my/ojs/index.php/oiji/article/view/36/19
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Malaysian Government agencies are gradually enhancing their ICT infrastructure. The wireless network is one of the important elements in ICT infrastructure since it is famously known for the most vulnerable area of cyber-attacks. Planning a perfect access control and security protection for wireless network is one of the crucial task of network administrator and information security officer. Generally, data transfer in government agencies is highly classified and if it falls into wrong parties it could lead to a major disaster. This identified wireless network risk has to be mitigated with highly durable security and network protection. It is important to develop a highly secure network for government agencies and this could assist by a standard network security auditing framework as a guideline. This guideline can be applied by all the government agencies during their network development project and secure their network is fully protected. Therefore, an operating government agency is selected for this research for further study and development of this framework. A survey and observation activities have been conducted to collect sufficient information needed and a standard auditing framework is developed.