@article{Chimmanee_Narkpraphan_2021, place={Bangkok, Thailand}, title={A Guidelines for Developing the Cyber Security on Wireless Security at the Buddhist Places According to Hotel Guidelines}, volume={8}, url={https://so04.tci-thaijo.org/index.php/JMA/article/view/249159}, abstractNote={<p>     This research article objectives are (1) to study the guidelines for wireless security from the NIS standard;(2) to study the patterns of attacks via wireless network systems and prevention methods; (3) to study and find guidelines for the development of security in wireless networks in the area of the Buddhasthan.</p> <p>      Apply pattern qualitative research the population and samples are Atelecommu-nication specialist working in a computer network company and who have experience in computer networking by being a network installer The instrument used was a question-naire by interviewing 8 experts, divided into 2 groups.</p> <p>     The results of the study found that (1) wireless security guidelines from the National Institute of Standards and Technology (NIST) should proceed as follows: (1.1) Assigning rights such as OTP, MFA (1.2) Equipment that should be installed are: WIDS IDS/IPS and SIEM with UEBA function (1.3) Vulnerability check and patch update (1.4) Surveillance system (2) to study the patterns of attacks via wireless network systems and methods of prevention It covers all 8 areas as follows: (2.1) Confidentiality (2.2) Integrity (2.3) Availability (2.4) Access Control (2.5) Guidelines for preventing attacks via wireless networks by installing a WIDS system. The installation of APs must try to eliminate the signal from outside the area to a minimum. Added installation of user identification system and disable visibility between clients, etc. (2.6) Continuously monitor attacks and exploits through vulnerabilities. This may be used to help check or look at the reports in the IDS IPS (2.7) Guidelines for penetration testing and detection of security vulnerabilities are widely known. Check for device malfunctions Check nearby wireless devices. Check the internal access point. internal device test network fundamentals (2.8) Regular monitoring of attacks and exploitation and periodic assessment by making reports in days, weeks and months to analyze whether there are adequate preventive measures (3) guidelines for the development of security in wireless networks in the area of the Buddhasthan for consideration is for security in wireless network installations Firewall and WLAN should be zoned to separate the network into sections. including assigning access rights according to functions and receiving services in the following zones (3.1) A cubicle or room in a Buddhasthan area (3.2) a common area in a Buddhasthan area (3.3) a meeting room (3.4) an office (3.5) CCTV (3.6) A IOT device.</p>}, number={2}, journal={Mahachula Academic Journal}, author={Chimmanee, Krishna and Narkpraphan, Dejpasit}, year={2021}, month={Aug.}, pages={236–253} }