Wireless Systems. Wireless systems provide a cost-effective solution for extending wired networks to remote areas. However, wireless systems also provide an easy means of hostile exploitation, such as when unauthorized wireless access points are installed. a. Installation of wireless access points (stand alone or connected to OSA network) without prior approval from the IRM is strictly prohibited. b. The ISO will periodically scan for wireless networks. Unauthorized wireless systems will be shut down and equipment confiscated. c. Wireless networks must be secured utilizing encryption. Wireless systems will conform to appropriate best business practices and configured for a minimum of FIPS 140-2 encryption. d. At no time will any access point be installed in offices as an extension to connect additional computers or printers to a State network without prior approval from the IRM. e. Wireless networks must operate in conjunction with an approved wireless network security solution to reduce the likelihood of hostile exploitation of the OSA by rogue devices.
Appears in 2 contracts
Sources: Information Technology Acceptable Use Policy, Information Technology Acceptable Use Policy