Security Footprint roleplays as a malicious user or attacker attempting to gain unauthorised access to the wireless network environment and its underlying infrastructure components. Key objectives include assessing the Wireless deployment against industry recognised security best practices, guidelines and company policy.
At a high level the security testing includes the following methodology: