Australian Information Security Management Conference

Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University, Perth, Western Australia

Comments

Originally published in the Proceedings of 4th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 5th December, 2006

Abstract

A wireless network solution is generally implemented when the bounds of walls of buildings and the constraints of wires need to be broken. Wireless technologies provide the potential for freedom of mobility which is undoubtedly a convenience for organisations in today’s market. The security of a wireless network is crucial for data integrity, especially when the data is not secured by the insulation of wires. While data is being transferred across a wireless network, it is vulnerable. There is no room for error, neglect or ignorance from an organisation, as a breech of data integrity can be devastating for both businesses and institutions. Securing a wireless network needs to be treated as mandatory for educational institutions, and not just as best practice. With both legal and financial consequences for a breech of data integrity and the data protection act, education institutions need to realise the legal obligations and liabilities they face with respect to the sensitive data and information traversing their network.

DOI

10.4225/75/57b65d583476f

Share

 
COinS