Chapter 9. Wireless LAN Security Auditing

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • WLAN security audit

    • OSI Layer 1 audit

    • OSI Layer 2 audit

    • Penetration testing

    • Wired infrastructure audit

    • Social engineering audit

    • WIPS audit

    • Documenting the audit

    • Audit recommendations

  • WLAN security auditing tools

    • Linux-based tools

    • Windows-based tools

Wireless LAN Security Auditing

These changes may directly affect the security posture of the WLAN. The users of a WLAN will often complain if the network becomes "slow" or "unavailable," but will not complain about security holes because they do not know how to look for them. Users only care about their ability to access resources and do their jobs. ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.