Auditing WLAN (Wireless Local Area Network) and mobile devices involve evaluating the wireless network’s security and performance and the devices that connect to it. This includes checking for potential security threats, such as unauthorized access, rogue access points, or weak encryption, and verifying that the network and devices meet established security policies and standards. Auditing aims to identify and address any issues that could impact the security and performance of the network and ensure that it operates optimally and securely.

The scope of an audit of WLAN and mobile devices typically includes:

  1. Network Architecture: Evaluating the design and architecture of the wireless network, including the placement of access points, the use of firewalls, and the use of VLANs.
  2. Device Configuration: Reviewing the configuration of mobile devices, such as smartphones, tablets, and laptops, to ensure they meet the established security policies and standards.
  3. Wireless Security: Checking the security of the wireless network, including the encryption methods used, the use of strong passwords, and the presence of firewalls.
  4. Rogue Devices: Identifying any unauthorized wireless devices that may have connected to the network, including rogue access points or malicious wireless devices.
  5. Network Performance: Evaluating the performance of the wireless network, including the speed and reliability of the connection, and identifying any issues that may impact performance.
  6. Policy Compliance: Verifying that the network and devices comply with relevant laws, regulations, and organizational policies, such as data privacy and data retention policies.

Tools for conducting an audit of WLAN and mobile devices, including:

ToolsWebsite
NetStumblerwww.netstumbler.com
kismetwww.kismetwireless.net
Wi-Fi Planetwww.wi-fiplanet.com
WirelessDefence.orgwww.wirelessdefence.org
Aircrack-ngwww.aircrack-ng.org
TamoSoftwww.tamos.com
BackTrack Virtual Machinewww.backtrack-linux.org
Xirrus WiFi Inspectorwww.xirrus.com/library/wifitools.php
AirMagnetwww.airmagnet.com
metageek and inSSIDertoolwww.metageek.net
Wardriving toolswww.wardrive.net/wardriving/tools
Sybase Mobile Enterprisewww.sybase.com/products/mobileenterprise
GoodLinkwww.good.com
Research in Motion (RIM)www.blackberry.com
Mobile Device Managerwww.microsoft.com/systemcenter/mobile/default.mspx
Parabenwww.paraben-forensics.com

Steps to perform this Audit:

  1. Define the scope of the audit: Determine the specific areas of the wireless network and mobile devices that will be evaluated, including the devices, the network architecture, and security measures.
  2. Plan the audit: Determine the resources required for the audit, including the tools and personnel needed, and develop a timeline for the audit.
  3. Collect data: Collect data on the wireless network and mobile devices, including device configurations, network logs, and performance data.
  4. Evaluate security: Evaluate the security of the wireless network and mobile devices, including the use of encryption, the presence of firewalls, and the security of device configurations.
  5. Identify vulnerabilities: Identify any potential security threats or vulnerabilities in the wireless network and mobile devices.
  6. Evaluate compliance: Verify that the network and devices comply with relevant laws, regulations, and organizational policies, such as data privacy and data retention policies.
  7. Report findings: Prepare a report detailing the findings of the audit, including any potential security threats, vulnerabilities, or policy violations, and recommend remediation steps.
  8. Implement remediation: Implement any necessary remediation steps to address any issues identified during the audit, and monitor the network and devices to ensure they continue to operate securely and optimally.

Checklist for Auditing Wireless LANs

  • Ensure that access points are running the latest approved software.
  • Evaluate the use and controls around centralized WLAN management.
  • Verify that your mobile clients are running protective software.
  • Evaluate the security of the chosen authentication method.
  • Evaluate the security of the chosen communications method.
  • Evaluate the use of security monitoring software and processes.
  • Verify that rogue access points are not used on the network.
  • Evaluate procedures in place for tracking end-user trouble tickets.
  • Ensure that appropriate security policies are in place for your WLAN.
  • Evaluate disaster-recovery processes in place to restore wireless access should a disaster occur.
  • Evaluate whether effective change-management processes exist

Checklist for Auditing Mobile Devices:

  • Ensure that mobile device gateways are running the latest approved software and patches.
  • Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.
  • Determine the effectiveness of device security controls around protecting data when a hacker has physical access to a device.
  • Evaluate the use of security monitoring software and processes.
  • Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.
  • Evaluate procedures in place for tracking end-user trouble tickets.
  • Ensure that appropriate security policies are in place for your mobile devices.
  • Evaluate disaster recovery processes in place to restore mobile device access should a disaster happen.
  • Evaluate whether effective change management processes exist.
  • Evaluate controls in place to manage the service life cycle of personally-owned and company-owned devices and any associated accounts used for the gateway.

Conclusion:

In conclusion, auditing WLAN and mobile devices is a crucial step in ensuring the security and performance of the wireless network and the devices that connect to it. The purpose of the audit is to identify and address any potential security threats or vulnerabilities, verify compliance with relevant laws, regulations, and organizational policies, and ensure that the network and devices operate optimally and securely. Regular audits, using a combination of tools and best practices, can help organizations to maintain a secure and efficient wireless network and mobile device environment.

Leave a Reply