Design and implement a secure enterprise wireless

Assignment Help Strategic Management
Reference no: EM132397958 , Length: word count:600

Assessment - Design and implementation of secure enterprise wireless network

Purpose of the assessment -

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

d. Apply wireless network security techniques in the context of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

You are hired to secure a wireless enterprise network. Your client wishes to build a secure wireless network where the visitors can access the Internet whilst their internal data is protected from the visitors or hackers. You are to provide a full report and demonstrate a prototype of network in a simulated platform (i.e. packet tracer or GNS3).

Secure enterprise wireless local area networks can provide mobility and connectivity where wired connections are not practical. Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the malicious hackers to try and access confidential enterprise information.

Recent advances in WPA2-Enterprise deployment include: installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

In your report, you are to design and implement a secure enterprise wireless network, considering the ethical implications. You are required to complete the following tasks and submit a report on Moodle.

1. Discuss the ethical implications in the vulnerabilities of wireless network technologies.

2. Design a secure enterprise wireless network using the network simulator of your choice.

*3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following CIAAA elements:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network

6. Demonstration of your network prototype in Week 11 lab.

The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group should be from the same lab.

Note: Need to do only task 3.

Reference no: EM132397958

Questions Cloud

Discussing the use of encryption to protect data : Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
Emerging enterprise network applications : Research at least two articles on the topic of emerging enterprise network applications. Write a brief synthesis and summary of the two articles.
Information security and risk management : How the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.
Identify a variety of epistemological theory : Identify and apply a variety of epistemological theory. Understand the difference between a rhetorically good argument and a rationally good argument.
Design and implement a secure enterprise wireless : BN303 - Wireless Networks and Security - Design and implement a secure enterprise wireless network, considering the ethical implications
Creating company E-mail and wifi-internet use policies : Creating company E-mail and wifi/internet use policies
Describe the different staffing initiatives : As the authors discussed, evaluating a staffing system allows the organization to objectively assess how well its different staffing initiatives are working.
Critique the finding of the nevada supreme court : In the 1997 case of University and Community College System of Nevada v Farmer, Farmer was initially awarded $40K in damages for violation of the Equal Pay Act.
Security monitoring system : You are a team of security consultants for a small company and the owner would like you to purchase cameras to install as part of a security monitoring system

Reviews

Write a Review

Strategic Management Questions & Answers

  Calculate the past sales growth rate for the company

Calculate the past sales growth rate for the company if there is historical data. If the case has data on historical industry sales.

  Analyze kodak''s horizontal and vertical integration strategy

Analyze Kodak's horizontal and vertical integration strategy and determine the corporate level strategy that is more appropriate for the company to establish a competitive advantage in the Cloud service industry. Provide a rationale for the determ..

  How an individual employees personality affect performance

How might an individual employee's personality affect the performance of an organization? If the effect is negative, how might you change this? If the affect is positive, how can you capitalize on this?

  Compare management education and on-the job experiences

Compare and contrast management education and on-the job experiences. How can these be combined in a strategic management development process?

  What are the elements of the swot analysis

The four elements of the SWOT analysis are: Strengths, Weaknesses, Opportunities and ______. (W6) Which of the following would NOT be included in an analyses.

  How much time should employees focus

How much time should employees focus on them?

  Discuss investment options for a small inheritance

Debbie Gibson is considering three investment options for a small inheritance that she has just received-stocks, bonds, and money market.

  What are the various levels of management

What are the various levels of management, and how do they participate in the process of strategic decision making?

  Technological paradigm shifts happen all the time

Technological paradigm shifts happen all the time. One example is the telecommunications industries in developing countries, where consumers are choosing to adopt wireless technology before wired technology.

  Develop and strategy map to tell your story

Develop a Strategic Plan for a fictional small to medium sized business that you are the owner of. The business can be in the product or service sector. Develop and Strategy Map to "Tell Your Story"

  Increasing the current customers rate of use

Imagine that you have been hired by Amazon to review its long-term online strategy. Increasing the current customers' rate of use

  Explain which companies have fallen out of the top ten

Explain which companies have fallen out of the top 10? Pick one of the companies and investigate why it is no longer on the list.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd