Wireless Security Assessment is a counterpart of the broader concept of ‘Security Assessment’ – which takes care of the security of an enterprise in a holistic sense of word by performing evaluations such as Extended Internet Footprint Assessment, Source Code Review, Infrastructure Assessment, Application Assessment and SCADA Assessment. What grants Wireless Security Assessment the spotlight of our attention is the increasing ease of its deployment through the addition of rogue Access Points (AP) by anybody from an amateur user to the administrator. In all, Wireless Security Assessment aims at setting up a security baseline, checking compliance, gathering film-ware versions for all equipments,
determining maximum distance that wireless traffic can be received, discovering unauthorized access points, verifying if unencrypted traffic is traversing the wireless network and ensuring that weak forms of WEP are not in use. To understand Wireless Security Assessment in its actual depth, let’s look at the two types of methodologies that are available:

1. Manual Assessment Methodology
2. Automated Assessment Methodologies.

Manual Assessment Methodology:
The Manual Assessment Methodology, otherwise known as Ad-hoc Assessment, is a voluntary security evaluation that happens in a moment of time. The Manual Assessment Methodology employs the type of typical tools most people looking for an open AP are aware of these tools can be anything from NetStumbler & WiFiFoFum to Airsnort & Airmagnet. The Manual Assessment Methodology comes to play when the current operating status of a wireless environment is to be checked. It’s also used to evaluate if the Automated Assessment Methodology is functional.

Automated Assessment Methodology:
An Automated Assessment Methodology is an on-going intuitive security interface that alerts the wireless environment should there be any discrepancies in the same, be it: changes, additions or any sort of suspicious activity. Considering the threat an insecure wireless device can pose to its environment, it’s best to think of the Automated Assessment Methodology to be an imperative. However, networks such as Wi-Fi hotspots needn’t necessarily have an Automated Assessment process, for the reason that they are by nature open and also because they are principally used only for internet access. The agenda of an Automated Assessment Methodology is to alert the personnel of questionable security discrepancies that occur in the network as and when they are happening in real-time.

Why Wireless Assessment is necessary?
Wireless Assessment is of utmost importance. A secure Wi-Fi is totally dependent upon the type of security encryption used. A weak encryption leads to a vulnerable Wi-Fi network which is susceptible to below mentioned vulnerability attacks.

– Wireless Access Control Attacks:
– Wireless Integrity Attacks:
– Wireless Confidentiality Attacks:
– Wireless Availability Attacks:
– Wireless Authentication Attacks:

A well patched network avoids prevents these attacks.

We take our customers’ IT landscape to the desired state of the security robustness with our understanding of cyber security through the whole organization, from strategy, to tactical decisions and operational management.


We believe in enhancing the business value of our valued clientele by enhancing their

  • Competitive advantage
  • Security compliance
  • Risk management
  • Reputation Protection
  • Data protection
  • Finance protection
  • Business continuity