1 / 11

Wireless Security Policies Session How the Port of Seattle Is Proceeding

Pacific Northwest Digital Summit, Tacoma, Washington June 21, 2005. Wireless Security Policies Session How the Port of Seattle Is Proceeding. Ernie Hayden, CISSP Chief Information Security Officer Port of Seattle. Today’s Agenda. Brief Overview of the Port of Seattle

aurek
Download Presentation

Wireless Security Policies Session How the Port of Seattle Is Proceeding

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pacific Northwest Digital Summit, Tacoma, Washington June 21, 2005 Wireless Security Policies SessionHow the Port of Seattle Is Proceeding Ernie Hayden, CISSP Chief Information Security Officer Port of Seattle

  2. Today’s Agenda • Brief Overview of the Port of Seattle • Underpinnings of Information Security Concerns and Wireless Technologies • High Level Overview of Our Process

  3. Information Security & WirelessUnderpinnings • The “Convenience” Factor • Management, Management And Management

  4. The “Convenience Factor” Increased Security Convenience More Less

  5. The “Convenience Factor” Increased Liability Convenience More Less

  6. Crossover Point moves based on Security Needs, etc. Where Does Wireless Fit? The “Convenience Factor” Increased Increased Liability Security Convenience More Less

  7. Management, Management and Management • You Need To Educate MANAGEMENT About Wireless • Strengths, Weaknesses, Liabilities, Constraints • You Need To MANAGE The Wireless System & Environment • SSIDs, WEP Keys, MAC Addresses, Access Point Management, Locations, Rogue Access Points, Legacy Equipment • You Need To Watch Out for MANAGEMENT To Be Sure Their Enthusiasm Isn’t Too Excessive • Best Buy / Circuit City / Frye’s Purchases for Work and Play!

  8. Port of Seattle Actions • Wireless Applications • Police Cars (Wireless & CDMA for Mobile Network Interface) • Hot Spots in Key Areas for Port of Seattle Police • Using In Motion; Plan to move to CISCO Mobile Router • Conference Rooms / Conference Areas • Evaluating for Future Deployment • Policies & Procedures • Still Under Development • Appropriate Use Procedure Requires CIO Written Approval for ANY Access Point Deployment

  9. Conference Room Deployment • CISCO Access Points • 802.11g with WPA • SSIDs are Hidden • Access ONLY to Internet via Separate VLAN • Continued Access to Intranet is Via VPN Access and Authorization

  10. Other Actions • Low-Tech Search for Rogue Access Points • Examining Future Deployment of 802.11i with 802.1x Authentication and AES Encryption • Bluetooth Concerns • Possible Compromise • Substantial Use on Smart Phones • Considering Security Policy / Guideline at a Minimum

  11. Thanks! Ernie Hayden, CISSP CISO Port of Seattle 2711 Alaskan Way – Pier 69 Seattle, WA 98121 206-728-3460 Hayden.e@portseattle.org

More Related