We assess and analyze internal security challenges within WLAN, access point radio, and cypher.

 

More and more companies started to install Wi-Fi to improve their working environment.
However, vulnerabilities have been reported within WLAN. Without an appropriate security measures, your information may be under the threat of eavesdropping and intrusions.

 

Description

The most common information security vulnerabilities within WLAN network are:

  1. Unauthorized access points
  2. Cipher strength
  3. Unsecure settings
  4. Insufficient access restrictions
  5. Eavesdropping
  6. Identity theft etc.

 
The WLAN Security Assessment tests if you have appropriate security measures on your Wi-Fi access points. We also provide investigation on unofficial access points that are not within the PCI DSS (Payment Card Industry Data Security Standard) requirements.
 

Details

  • Remote assessment
    Tests your security configuration
  • On-site assessment

 
We will conduct a pseudo attack with your consent to test the resistance against eavesdropping and identity theft by attackers.
 

What you get:

You’ll be able to visualize the vulnerability in access points outside of your management. By implementing proper measures on the vulnerabilities, you can improve the security of your Wi-Fi network.
 

Features

1. Checks security insufficiency through WLAN specifications, etc.

Identify security measure status that cannot be evaluated through onsite investigation from your specifications document.
 

2. Investigates unofficial access points and signal leakage status

Determines the presence of unofficial access points from multiple locations. Confirms the access point signal cannot be received from outside of service provision
 

3. Pseudo attack test against official access points.

Analysis on authentication key by intercepting transmitted connection signal such as WPA
 

Primary Assessment Subjects

  • Unauthorized access points
  • Presence of non-administrative access points
  • Cipher Strength
  • Possibility of eavesdropping on communications
  • Insufficiency of secure settings
  • SSID, PSK, MAC address, IEEE 802.1X, etc.

 

Our Approach