Skip to Main Content
IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

by Chris Davis, Mike Schiller, Kevin Wheeler
February 2011
Intermediate to advanced content levelIntermediate to advanced
512 pages
15h 37m
English
McGraw-Hill
Content preview from IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

CHAPTER 12Auditing WLAN and Mobile Devices

This chapter discusses two separate audits, beginning with wireless local area networks (WLAN) and then covering data-enabled mobile devices. WLAN audits include the clients, communications, access points, and operational factors that enable a WLAN on your network. Data-enabled mobile device audits include Blackberry, iPhone, Droid, and similar data-enabled devices and the infrastructure that supports them. The following topics are discussed:

• The background of WLAN and mobile device technologies

• Essential auditing issues for these technologies

• Key technical steps and suggestions regarding how to approach the technologies

• Operational steps necessary to keep these technologies operating efficiently ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Legal and Privacy Issues in Information Security, 3rd Edition

Legal and Privacy Issues in Information Security, 3rd Edition

Joanna Lyn Grama
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9780071742382