Ensures protection against unauthorized access to wireless networks and wireless data, and verifies segregation of guest access from private networks and systems. Also identifies potential back-doors through rogue access points. Assesses corporate, guest, and point-to-point wireless LAN deployments to identify weaknesses in architecture, configuration, authentication, and encryption including identification of rogue access points. Validates that authentication and encryption prevent unauthorized access and traffic snooping.
user/guest wireless assessment encryption strength auth strength rogue access points wireless segregation wireless infrastructure vulnerabilities
private wireless guest wireless authentication encryption segregation configuration rogue wireless
best-practices PCI-DSS (Section 11.1)