Utilize a discovery tool or process to examine the network topology to collect the "ground truth" list of wireless access points connected to the wired network.
Evaluate the complement of Input 1 and Operation 1 to obtain the list of non-inventoried wireless access points.
Evaluate the intersection of Input 1 and Operation 1 to obtain the list of inventoried wireless access points.
Compare the results of Operation 3 to the inventory to determine which access points in the inventory are noted as not authorized.
Measures:
M1 = The number of wireless access points in the inventory
M2 = The number of discovered wireless access points, from Operation 1
M3 = The number of non-inventoried wireless access points, as discovered by Operation 2
M4 = The number of inventoried wireless access points, as discovered by Operation 3
M5 = The number of discovered but non-authorized wireless access points, as discovered by Operation 4
Maintain an inventory of authorized wireless access points connected to the wired network.
Measures
Metrics