Article 7
|
(Wireless Networks)
- Security protocols in force as have been publicly ratified and containing no vulnerability shall apply to the protection of access to wireless networks which an organization makes available to internal personnel. These protocols should follow the organization's internal network management procedures and be restricted to official use by organizational personnel or approved use by information service providers.
- If an organization provides external wireless network access, its access protection should also use security protocols that are publicly ratified and contain no vulnerabilities.
- An organization shall formulate wireless network password rules to minimize the risk of cracking.
|