Presentation is loading. Please wait.

Presentation is loading. Please wait.

How the Port of Seattle Is Proceeding Wireless Security Policies Session How the Port of Seattle Is Proceeding Ernie Hayden, CISSP Chief Information Security.

Similar presentations


Presentation on theme: "How the Port of Seattle Is Proceeding Wireless Security Policies Session How the Port of Seattle Is Proceeding Ernie Hayden, CISSP Chief Information Security."— Presentation transcript:

1 How the Port of Seattle Is Proceeding Wireless Security Policies Session How the Port of Seattle Is Proceeding Ernie Hayden, CISSP Chief Information Security Officer Port of Seattle Pacific Northwest Digital Summit, Tacoma, Washington June 21, 2005

2 Today’s Agenda Brief Overview of the Port of Seattle Underpinnings of Information Security Concerns and Wireless Technologies High Level Overview of Our Process

3 Information Security & Wireless Underpinnings The “Convenience” Factor Management, Management And Management

4 The “Convenience Factor” Less More Increased

5 The “Convenience Factor” Less More Increased

6 The “Convenience Factor” Less More Increased Crossover Point moves based on Security Needs, etc.

7 Management, Management and Management MANAGEMENTYou Need To Educate MANAGEMENT About Wireless –Strengths, Weaknesses, Liabilities, Constraints MANAGEYou Need To MANAGE The Wireless System & Environment –SSIDs, WEP Keys, MAC Addresses, Access Point Management, Locations, Rogue Access Points, Legacy Equipment MANAGEMENTYou Need To Watch Out for MANAGEMENT To Be Sure Their Enthusiasm Isn’t Too Excessive –Best Buy / Circuit City / Frye’s Purchases for Work and Play!

8 Port of Seattle Actions Wireless Applications –Police Cars (Wireless & CDMA for Mobile Network Interface) Hot Spots in Key Areas for Port of Seattle Police Using In Motion; Plan to move to CISCO Mobile Router –Conference Rooms / Conference Areas –Evaluating for Future Deployment Policies & Procedures –Still Under Development –Appropriate Use Procedure Requires CIO Written Approval for ANY Access Point Deployment

9 Conference Room Deployment CISCO Access Points 802.11g with WPA SSIDs are Hidden Access ONLY to Internet via Separate VLAN –Continued Access to Intranet is Via VPN Access and Authorization

10 Other Actions Low-Tech Search for Rogue Access Points Examining Future Deployment of 802.11i with 802.1x Authentication and AES Encryption Bluetooth Concerns –Possible Compromise –Substantial Use on Smart Phones –Considering Security Policy / Guideline at a Minimum

11 Ernie Hayden, CISSP CISO Port of Seattle 2711 Alaskan Way – Pier 69 Seattle, WA 98121 206-728-3460 Hayden.e@portseattle.org


Download ppt "How the Port of Seattle Is Proceeding Wireless Security Policies Session How the Port of Seattle Is Proceeding Ernie Hayden, CISSP Chief Information Security."

Similar presentations


Ads by Google