Wireless Security Assessment (WSA)

Ensures protection against unauthorized access to wireless networks and wireless data, and verifies segregation of guest access from private networks and systems. Also identifies potential back-doors through rogue access points. Assesses corporate, guest, and point-to-point wireless LAN deployments to identify weaknesses in architecture, configuration, authentication, and encryption including identification of rogue access points. Validates that authentication and encryption prevent unauthorized access and traffic snooping.

Highlights
  • Enumeration of all active SSIDs
  • Evaluation of auth/encryption strength for authorized wireless networks
  • Assessment of isolation of guest wireless
  • Enumeration of vulnerabilities with wireless infrastructure
  • Review of guest/user wireless account provisioning protocols
  • Identification of rogue access points
  • Evaluation of access achievable through rogue wireless
  • Remediation recommendations
Targets
  • Authorized employee wireless networks
  • Guest wireless networks/supporting infrastructure
  • Special purpose wireless networks
  • Point-to-point wireless networks
  • Auth/encryption protocol/implementation vulnerabilities
  • Network segregation issue
  • Rogue access points/networks

Need More Information?

How well is your company protected against a Malware or Ransomware attack? Contact us for a free Ransomware Simulation and validate your preparedness.

Contact Us