Identify and analyse the attack with highest criticality

Assignment Help Computer Network Security
Reference no: EM132083094 , Length: word count:2000

Evaluation of LTE/LTE-A Network Security

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

Reference no: EM132083094

Questions Cloud

What kind of strategies that investor can use : Please help me understand what kind of strategies that investor can use when they are in situations that experience bull markets
Explain the idea of a tradeoff : Explain the idea of a tradeoff and think of an important tradeoff that you have made today.
What is the minimum transfer price : What is the minimum transfer price for the 200,000-unit order that Land would accept if it were willing to maintain the same ROI with the transfer
How to handle their ipv4 or ipv6 traffic : How can a user coordinate with other organizations with which the networks connected to determine how to handle their IPv4 or IPv6 traffic?
Identify and analyse the attack with highest criticality : MN603 - Wireless Networks and Security - Evaluation of LTE/LTE-A Network Security - compare the wireless communication technologies and evaluate the LTE/LTE-A
List the relevant costs and total amount to elite office : Direct Labor $19; Variable Manufacturing Overhead $6; List the relevant costs and total amount to Elite Office Furniture for this special order
Describe the importance of relationship management : Describe the importance of relationship management to the success of an alliance - Analyze HR strategies for promoting a successful alliance
What is division b division segment margin : Next Step Company is a two-division firm and has the following information available for this year: What is Division B division segment margin
What is the angle of friction of the ashover grit : What is the angle of friction of the Ashover Grit - Determine what rock formation is the prime target, select the best possible drilling site

Reviews

len2083094

8/11/2018 1:30:55 AM

Conclusion /4 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2083094

8/11/2018 1:30:49 AM

LTE/LTE-A Architecture /5 Excellent understanding of LTE/LTE-A Architecture Very good understandi ng of LTE/LTE-A Architecture Good understanding of LTE/LTE-A Architecture Demonstrated adequate understanding of LTE/LTE-A Architecture Poor understanding of LTE/LTE-A architecture Evaluation of LTE/LTE-A Attacks on access and core networks /10 Exceptional evaluation of LTE/LTE attacks on access and core networks Good evaluation of LTE/LTE attacks on access and core networks Evaluation of LTE/LTE attacks on access and core networks Evaluation of a few LTE/LTE attacks on access and core networks Unable to evaluate LTE/LTE attacks on access and core networks Identification and Analysis /7 Identified the attack and provided excellent justification Identified the attack and provided good justification Identified the attack and provided valid justification Identified the attack and failed to provide valid justification Failed, to identify the attack and provide justification

len2083094

8/11/2018 1:30:42 AM

Marking Rubric for Assignment #1: Total Marks 50 Grade Mark HD 48-60 DI 42-47 CR 36-41 P 30-35 Fail <30 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used. Comparison of cellular networks /12 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len2083094

8/11/2018 1:00:11 AM

LTE/LTE-A Architecture Explore the LTE/LTE-A architecture 5 Evaluation of LTE/LTE-A Attacks on access and core networks Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive. 10 Identification and Analysis Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 7 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 5 Total 60

len2083094

8/11/2018 12:59:56 AM

Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20

len2083094

8/11/2018 12:59:48 AM

• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2083094

8/11/2018 12:59:39 AM

I would need two copies for this assignment and with 0% plagiarism report as well. There is one more requirement for this assignment is that for 2nd question which is "Explore the architecture of LTE/LTE-A" you need to attach image of general architecture of LTE/LTE-A and explanation of that as well. I will let you know if there are any changes to this assignment or not. Thank you.

Write a Review

Computer Network Security Questions & Answers

  Perform a port test on the server your computer is using

Use a website called Shields Up to elaborate your answer to the question above. Perform a port test on the server your computer is using for networking.

  How do political element within the us affect cyber security

How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security?

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

  Explain the importance of communication protocols

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis.

  Develop a vender information security policy

Give one example for the different Risk Mitigation techniques? When should a company develop a vender Information Security Policy?

  Identify hardware needed to secure your choice of networks

Identify hardware and software needed to secure your choice of networks against all electronic threats. Compare Local Area Networks (LANs), Wide Area Networks (WANs), and wireless technologies.

  What problems would you foresee in the development

Wireless computing is receiving much attention these days. Why do you think that it would be useful? What problems would you foresee in the development?

  Create an enterprise key management system

Identify Components of Key Management - Advanced Cryptography Functions and Identify Key Management Gaps, Risks, Solutions, and Challenges

  Explaining organization-s security architecture

Consider your organization's security architecture. How much do you know about it? How much do other workers know? How easy is it to learn more?

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Describe the main objectives of the anba drp

Explain the key ways that ANBAs DRP can help mitigate risk in the organization and defend the need for DRPs in an enterprise organization such as ANBA.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd