Security Audit on a Personal WLAN Infrastructure
Conduct a Security Audit on a Personal WLAN Infrastructure
As the junior member of the Just Ducky network security team, you want to make sure you apply your wireless security knowledge to protect your home wireless network.
• Create your own version of a comprehensive Wireless Security Audit Checklist.
• Select a Personal WLAN infrastructure and obtain written permission to conduct a Security Audit.
• Write your conclusions providing a description of the security posture of the selected WLAN and include recommendations.
Submit:
1. Wireless Security Audit Checklist Template
2. Checklist with Audit Results
3. Conclusions and Recommendations
4. Written permission
Sample Solution
Wireless Security Audit Checklist- Network Infrastructure
- What is the make and model of the wireless router?
- What is the wireless router's security protocol?
- What is the wireless router's password?
- Is the wireless router's firewall enabled?
- Is the wireless router's firmware up to date?
- Wireless Devices
- What wireless devices are connected to the network?
- What is the security protocol for each wireless device?
Full Answer Section
-
- What is the password for each wireless device?
- Are the wireless devices up to date with the latest security patches?
- Physical Security
- Is the wireless router in a secure location?
- Is the wireless router password-protected?
- Are the wireless device passwords strong and unique?
- Is the wireless network hidden?
- Network Infrastructure
- The wireless router is a [Make and Model] router.
- The wireless router's security protocol is WPA2-Personal.
- The wireless router's password is [Password].
- The wireless router's firewall is enabled.
- The wireless router's firmware is up to date.
- Wireless Devices
- There are three wireless devices connected to the network: a laptop, a desktop computer, and a smartphone.
- The laptop is using WPA2-Personal security.
- The desktop computer is using WPA2-Personal security.
- The smartphone is using WPA2-Personal security.
- The passwords for all three devices are strong and unique.
- Physical Security
- The wireless router is located in a secure location in the home.
- The wireless router is password-protected.
- The wireless device passwords are strong and unique.
- The wireless network is hidden.