6. Conclusion
The way this audit policies are implemented is fairly simple and if all the audits are passed every time, the wireless network infrastructure is proven secure. This means wireless audit policies are used to regulate the integrity of the Wi-Fi enabled networks. So the future audits can aim at automating and updating old policies, adding new policies, reviewing based upon user behaviour and other zero day attacks. It paves way for a huge chance that the attacks do not work on a network anymore or they are caught red-handed and proper disciplinary actions taken by the authorities concern. However, if an attack works within the audit team and most of them are compromised, then the state of affairs need to be handled and audit policies have to be redrafted based upon the infection mode of the individual entities.