Design and implement a secure enterprise wireless network

Assignment Help Computer Network Security
Reference no: EM132374653 , Length: word count : 2500

Assessment- Design, analyse, and implement a secure smart home WLAN and a secure enterprise WLAN.

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

Apply and evaluate wireless network security techniques in consideration of ethical implications;

Design and implement secure enterprise wireless networks.

Assignment Description

Smart home or home automation technology provides homeowners’ security, comfort, convenience and energy efficiency by enabling them to control smart devices, via an app on their smartphone or other networked device. This technology enables you doing things such as turn the lights on/off, stream music to a speaker, lock/open the doors remotely, and much more.

This assignment aims to simulate a smart home using IoT technology in Cisco Packet Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be used in the home. Those IoT devices will be connected to the home WLAN that enables the users to control the things through wireless technology. The users should also be able to control the things when they are outside home (remote access).

This means the WLAN should be connected to a global network that enables the users to have control on devices when they are at work. Hence, there is another WLAN at work that is connected to the global network.

Note, you need to make sure that the WLANs are secure.

This assignment requires the students to design, analyse, and implement a smart home, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of WLANs.

2. Design, analysis, and implementation of a smart home WLAN and an enterprise WLAN where the following aspects of security should be considered:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication

e. Authorization

3. Test and prove a successful of connectivity between users and IoT devices when they are at home and when they are at work. You need to take a snapshot for each step of testing followed by the explanation.

4. Demonstration in Week 11 during the Lab.

Reference no: EM132374653

Questions Cloud

Develop an online booking system for Restaurant : ISCG6420 Internet and Website Development Project Assignment - Create an Interactive Application, Unitec Institute of Technology, New Zealand
Why is efficiency and effectiveness important : Why is efficiency and effectiveness important to organizational performance?
Perform the swot analysis of ozco boats : BUS106 - Marketing Principles - Kaplan Business School - Individual Case Study Analysis - Provide a perceptual mapping of OzCo's customer segments
Jonah three measures for production management : Jonah's three measures for production management are throughput, inventory and operational expense,
Design and implement a secure enterprise wireless network : MN603 Wireless Networks and Security-Melbourne Institute of Technology-Australia-Design and implement a secure enterprise wireless network.
Calculate new MRP that improves the base MRP : Analyze the trade-off between overtime costs and inventory costs. Calculate a new MRP that improves the base MRP.
Why innovation might be important for an us company : Explain why innovation might be important for an US company in a global market. Topics could include NAFTA, Ethical issues
Develop hypotheses about role of the endorsement masculinity : PSYC313- Develop hypotheses about the role of the endorsement of masculinity norms in Australian men’s gendered-endorsement of traditionally masculine jobs.
Impact on the business environment : How to relate managerial hubris to ethical decision making and the overall impact on the business environment.

Reviews

len2374653

9/23/2019 12:28:59 AM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  Discuss four distinct steps found in every hack attack

Name the four steps and discuss each. Do you agree or disagree with this assertion? Why or why not?

  Calculate the value of the symmetric key

Explain your solutions for avoiding such attacks. Calculate the value of the symmetric key and the values of R1 and R2 in the Diffie-Helman Protocol for the set of given values.

  Compare tool for each of the three network management areas

Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not?

  Describe the process used in restoring the scrambled bits

Describe the process used in restoring the scrambled bits and determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data.

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  How did the cyberattack impact data loss

Identify one cyberattack that occurred in the last 2 years. What caused the cyberattack? Do not repeat an example that has been posted previously.

  How vulnerable end-users are leaving themselves

Students must NOT include any audio or video files. The PowerPoint virtual presentation will not be formally presented. As a result students must endeavour to convey their views and research findings whilst adhering to best presentation practices.

  What security functions are typically outsourced

What security functions are typically outsourced?

  Search the web for news on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2015. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.

  Critique the transition process performed by the dms in

write a three to four page paper in which youanalyze the security mechanisms needed to protect the dms systems from

  Demonstrate the use of hash tools to test integrity

Assignment is to give you hands­on experience in generating and using symmetric and public/private keys. Additionally, you will configure a web server to use SSL/TLS, and, using tcpdump, verify its effect in encrypting traffic.

  Describe the security tools and features of microsoft server

Describe the security tools and features of Microsoft Server 2008. Describe the common vulnerabilities associated with Microsoft Server 2008.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd