BN303 Wireless Networks and Security Assignment

Assignment Help Computer Network Security
Reference no: EM132639854

BN303 Wireless Networks and Security - Melbourne Institute of Technology

Assessment - Secured design of wireless LAN

Learning Outcome 1: Explain wireless communication protocols;

Learning Outcome 2: Utilise standards-based technologies used in various networks;

Learning Outcome 3: Apply wireless network security techniques in the context of ethical implications;

Learning Outcome 4: Design and implement secure enterprise wireless networks.

Design and implementation of wireless network for an enterprise.

Wireless networks are useful but prone to many security attacks. In order to secure wireless network but to retain its accessibility, mobility and connectivity, the network engineers must take care in designing and implementation of a wireless network.

The intent of network engineer is to extend the internet services from wired network using multiple access points in many carefully selected locations. One of the resolutions for wireless network security is to encrypt data and provide intelligent authentications - that is to segregate between the internal users to the external guest users. You can find a set of tools such as WAP or WAP2 that can help you to protect the wireless in such a way. In particular for authentication, the recommended solution is IEEE802.11x that provide authentication for devices trying to connect through wireless LANs.

The main objective in this assignment is to design and implement IEEE 802.1X standard for security over wireless LAN authentications for a campus with any a large number of students and staff (staff with more services available on authentication and authorizations).

In designing your network, consider the following:
• How can you secure your network from potential attacks? Are WPA or WPA2 sufficient for all future attacks? Consider the network design with devices that support 802.1X
• Design IEEE 802.11x network using Protection-Capable Management Frames.
• You need to deploy a secure 802.1X serve 2,000 students and 200 staff at a campus (consider using DMZ).
• Deploy a solution that supports all business and security requirements (on a simulated environment).

Requirements

Design and implement the network for the above scenario. You need to submit a group report with clear statement of individual group member's contribution on the front page.

In this report, you need to include:

• Design the wireless network of campus according to the given specification (the diagrams can be on Paint or other simple drawing platforms such as draw.io)
• Incorporate the network security using either WAP or WAP2.
• Present the security requirements for wired network and wireless network of campus given there are two groups of users - students (acting as guests) and staff (acting as internal users).
• Implement the designed network on a network simulator satisfying both business and security requirements (students with guest Internet access while staff having access to the Internal Data (consider DMS)) - you may need to clear on authentication and authorizations.
• Test and troubleshoot if any incompliance.
• Report the final working version of your network on a network simulator (e.g. Cisco Packet Tracer or other tools (including GNS3)).

Present the report with steps that explain all the solutions and implement the IEEE802.11x security demonstration using WAP or WAP2 (in the demonstration you need to consider how to user connect to the WLAN through the access point). Provide a plan to extend the network for more users if required.

Write a report that includes the following sections: abstract, introduction that contains brief history, network components etc, proposed solution along with figure, demonstration of your implementation and testing, and your future recommendations.

Attachment:- Wireless Networks and Security.rar

Reference no: EM132639854

Questions Cloud

Calculate profit as a percent of sales revenue for product : Using the plantwide approach, calculate the profit for each product. Also calculate profit as a percent of sales revenue for each product
Describe gdp and activities or purchases : Describe GDP and list 2 activities or purchases that will not count toward GDP in 2019 and explain why they will not count.
Is there an accounting rule against this practice : Do you agree or disagree with the manager's decision of when to ship goods to customers and record the revenue? Is there accounting rule against this practice
Determine the reimbursement from the centers for medicare : Using the most common office visit, CPT code 99214, determine the reimbursement from the Centers for Medicare and Medicaid Services.
BN303 Wireless Networks and Security Assignment : BN303 Wireless Networks and Security Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service
Explain the key characteristics of nonprofit hospitals : The board of directors of your for-profit hospital has been approached by a nonprofit hospital to consider a joint venture to take over their business resulting
Analyse the economic challenges zambia : Imagine you are a permanent secretary at the Ministry of Finance in Zambia. Analyse the economic challenges Zambia is experiencing.
Why does biotech inc allocate cafeteria costs to department : Biotech, Inc., recently began providing cafeteria services to its employees. Why does Biotech, Inc., allocate cafeteria costs to departments?
Determine the gross profit that McArthur-Douglas recognize : Determine the gross profit that McArthur-Douglas should recognize in both 2013 and 2014 using the percentage-of-completion method

Reviews

Write a Review

Computer Network Security Questions & Answers

  Briefly describe your cryptanalys is methodology

Decrypt this message, and briefly describe your cryptanalys is methodology. In particular, list features of the ciphertext that hindered or helped your decryption process.

  Impair an organizations information security

Compare and contrast a minimum of five potential threats and evaluate how these threats may impair an organization's information security.

  Develop a wireless and byod security plan

CST 630 Develop a Wireless and BYOD Security Plan - Explain how identity theft could occur and how MAC spoofing could take place in the workplace

  Define social engineering security threats

Select an article relevant to current social engineering threats. Topics could include, but are not limited to, phishing, quid pro quo, or diversion theft. Research and examine current information security systems designed to address social engine..

  Principles and theory of security management

so far this week we have discussed three types of security: retail, institutional, and industrial. I think that there is a little bit of confusion still about what the differences are between each of these types of security because we are looking..

  What are the various threats to information security

What are the various threats to information security

  What is the difference between a threat agent and a threat

What is the difference between a threat agent and a threat? What are the three components of the C.I.A. triangle? What are they used for

  Explain the different options for udp or tcp

Using Wireshark, analyze your TCP or UDP traffic on your machine. Run Wireshark for at least 10 minutes or give it enough time to capture some traffic.

  Analyze the emerging security threats

Analyze the emerging security threats presented within the "Security Threat Report 2014" report.

  Necessary and sufficient condition for perfect security

Show that a necessary and sufficient condition for perfect security is H(C|M) = H(C) for every set of probabilities. (Homophonic keys) Prove theorem for homophonic systems.

  Represent the encryption of plaintext

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Suppose y = DES(x, K) and y' = DES(c(x), c(K)), where c(·) denotes the bitwise complement of its argument

  Ethics, law and cybersecurity question

Ethics, Law And Cybersecurity assignment help and assessment help - Consumer surveys have suggested that many Internet users are concerned about losing bits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd