OWISAM (Open WIreless Security Assessment Methodology)
The increasing presence of wireless communication networks, and the use of laptops and mobile devices connected to home networks and corporate perimeter, exposes organizations to a number of attacks on its infrastructure. Currently, companies and computer security analysts do not have a standardized mechanism with which to analyze and classify the risk of wireless communications.
Although there are currently other security methodologies, as OWASP  or such as OSSTMM methodology , that reference safety aspects relating to wireless networks, this approach is far from agile and usable by security analysts.
OWISAM, whose acronym stands for Open WIreless Security Assessment Methodology arises in order to fill an existing need, to share with the community security controls to be checked over wireless communications networks and define an open, collaborative methodology to help system administrators and security analysts to identify risks, to minimize the impact of cyber attacks and ensure the protection of infrastructure-based Wireless 802.11 .
The license of the methodology OWISAM is Creative Commons Attribution ShareAlike 3.0 License (CC-BY-SA) , allowing the use, modification and reproduction by any individual.
This license helps the community to collaborate in the development of this methodology, combining knowledge and ensuring that all views have been considered.
Resources of interest:
- OWISAM Controls: List of security controls defined OWISAM.
- OWISAM Top 10: Analysis of the major safety risks in wireless networks.
- Methodology: Methodology reference.
The following Authors have collaborated in the edition this methodology.
Buscamos tu colaboración para que OWISAM crezca. Contacta con nosotros por Twitter o en la lista de correo. Anímate a colaborar en el wiki.