O'Reilly logo

IT Auditing: Using Controls to Protect Information Assets by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12Auditing WLAN and Mobile Devices

This chapter discusses two separate audits, beginning with wireless local area networks (WLAN) and then covering data-enabled mobile devices. WLAN audits include the clients, communications, access points, and operational factors that enable a WLAN on your network. Data-enabled mobile device audits include Blackberry, iPhone, Droid, and similar data-enabled devices and the infrastructure that supports them. The following topics are discussed:

• The background of WLAN and mobile device technologies

• Essential auditing issues for these technologies

• Key technical steps and suggestions regarding how to approach the technologies

• Operational steps necessary to keep these technologies operating efficiently ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required