Wireless Security Assessment (WSA)

Ensures protection against unauthorized access to wireless networks and data, verifies segregation of guest access from private networks and systems, and identifies potential backdoors via rogue access points. It assesses corporate, guest, and point-to-point wireless LAN deployments to identify weaknesses in architecture, configuration, authentication, and encryption, including detection of rogue access points. Validates that authentication and encryption effectively prevent unauthorized access and traffic snooping.


Highlights
  • Enumeration of all active SSIDs
  • Evaluation of authentication and encryption strength for authorized wireless networks
  • Assessment of isolation of guest wireless networks
  • Identification of vulnerabilities within wireless infrastructure
  • Review of guest/user wireless account provisioning protocols
  • Identification of rogue access points
  • Evaluation of access achievable through rogue wireless networks
  • Remediation recommendations
Targets
  • Authorized employee wireless networks
  • Guest wireless networks and supporting infrastructure
  • Special-purpose wireless networks
  • Point-to-point wireless networks
  • Authentication and encryption protocol implementation vulnerabilities
  • Network segregation issues
  • Rogue access points/networks
user/guest wireless assessment encryption strength authentication strength rogue access points wireless segregation wireless infrastructure vulnerabilities private wireless guest wireless authentication encryption segregation configuration rogue wireless best-practices PCI-DSS (Section 11.1)