March 2021
Intermediate to advanced
400 pages
14h 24m
English
A security audit follows many of the same steps as a risk assessment. The difference is that a security audit looks for proof that best practices and procedures were followed. In many cases, these audits are internal. However, the same person or team who performed the risk assessment should not carry out a security audit.
An auditor conducting a security audit for WLAN security vulnerabilities should look at the following points (in addition to those items examined on a wired network):