Identify suitable products that could used to resolve issues

Assignment Help Computer Network Security
Reference no: EM131974920

Wireless Security Assignment

Scenario

Rare Vintage Auto Parts Ltd supplies automotive parts to car mechanics, car dealerships, and the mining industry and lately to the enthusiastic motorists. There are 4 offices and 1 warehouse from where all stock is sourced. Currently the inventory system is located at the warehouse and is accessed on and expensive fixed 512Kbit lines.

The shops are geographically spread out as per the map below which is not to scale. The shops are located in Cockburn Central next to the Jandakot airport due to easy access for shipping parts over to customers, Kalamunda, Cottesloe, Bayswater (being the main Head Office) and Joondalup. Rare Vintage Auto Parts Ltd has recently had some issues in regards to the smooth running of their business. You have been assigned by your boss to assess and report on resolution strategies for the customer - i.e. Rare Vintage Auto Parts Ltd.

The Rare Vintage Auto Parts Ltd business generate a base turnover of $50 million per year with 150 employees. Over 50% of business revenue is from credit card transactions. The tills in the Bayswater (main head office and store) use wireless connections to communicate to the organisation network.

The company's main head office and store computer network is entirely wireless based as the business is located in a heritage listed building. The Cockburn Central store has a wired computer network but has wireless connectivity for the tills which seems to experience intermittent dropouts.

Both stores network via wireless link to the Bayswater Head office and shop for inventory. In addition, each store seem to have an access point so that the staff at each store can use handheld devices (such as PDAs, Smart devices, etc..) to take inventory, and another Access Point (AP) so that managers can use laptops in their office.

The incident

Last month, the company had to sack its IT Administrator for accessing illicit material after his 3rd warning. The IT administrator became hostile and had to be ejected from the premises by the police. In the meantime, one of the senior managers with very poor IT understanding has been tasked to managed the company computer network whilst you investigate and Later that afternoon the network for the Cottesloe shop became unserviceable.

Another concern that was mentioned by The Rare Vintage Auto Parts Ltd personnel was that the intermittency between Kalamunda and Joondalup store was more frequent. Connectivity to the Bayswater inventory is reliable but there are now errors in shipment because of an untraceable error. Orders arrive in correct order but when the automated deliveries are sent out quantities are wrong for 60% of orders causing massive restocking costs and loss of reputation.

The owner believes that the ex-IT Administrator is behind this as he was responsible for the commissioning of wireless systems, links, tills and deployment of the wireless network where all the shops including main head office/store would be able to communicate wirelessly. Police have been unable to respond or provide any detail. The person supporting the issue with the SQL inventory system has been unable to provide any data to explain the shipping errors. The account passwords and other traces of the old IT administrator have been cleansed from the system and were not traceable any more.

Current Wireless Installation Details

The information provided below was the only information that was left behind in a file by the ex-IT administrator found in one of the file cabinets.

- All sites are using 16Dbi omni-directional antennae's on 16 meter towers with 2 Watt injectors that connect to 200mw APs (Linksys WRT54G)

- The APs in the store are a mix of Cisco 1200 series APs

- Managerial AP is Cisco 1200 series at 100mW

- Inventory AP is Netgear WG602 at 100mW with 6dBi antenna

- Wireless cards are a mix of 802.11b and g cards from Netgear, Proxim and DLink

- There are some wireless tills

- WEP Encryption is being used

- SSID is Rare Vintage Auto Parts Ltd and is broadcasting

- No Firewall, VPN or other countermeasure except virus protection

- All Infrastructure is running on 172.16.0.0/16 network

Note: All the provided data for the current wireless installation details might not be the correct setup and it will be your responsibility to make the necessary assumptions while accounting for the new wireless design and deployment.

Task Details

Your report should detail the points as indicated in the Marks Allocation Guide below with the marks allocation and be addressed primarily to the management of Rare Vintage Auto Parts Ltd who are not security or IT experts. Note - the list of current installation above is NOT a list of issues - it is your job to identify the issues and to address them all in your report submission.

Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues. Your solution should exemplify best practice and produce a secured wireless installation for Rare Vintage Auto

Parts Ltd. The use of appendices is encouraged. Material in appendices does not contribute to word count. You have also been tasked to design and create a Bring Your Own Device Policy (BYOD) for Rare Vintage Auto Parts Ltd which was supposed to be implemented along the wireless network.

Report Length: 4000-5000 Words

The report should be set out in the following manner:

- 12 point Times New Roman
- 1.5 line spaced
- Margins set to 2.5 cm
- Justification - block justified
- Footer - Should contain your StudentID and Full Name (8 point type) and a Page number

The report should contain an index and have appropriate headings and sub headings. The style of the report is a business report and as such it is expected that you present a professional report in both format and style. It should also include the following:

- A detailed plan of hardware, software and equipment needed to achieve secure interconnection between all sites and in-house as well.

- Detailed security plans for deployment of 802.11 wireless and PDA/Mobile/Tablet solution for both the main head office/store and the remaining shops.

- Detailed risk analysis, plus resultant security countermeasures and policy to protect integrity and confidentiality of total network based upon this 802.11 deployment.

Attachment:- Wireless-Security-Assignment.rar

Reference no: EM131974920

Questions Cloud

Mean pulse rate of college students : Suppose the mean pulse rate of college students is 68 beats per minute with a standard deviation of 11.5.
What historical event had the greatest impact on missions : What historical event or movement from the readings this week do you think has had the greatest impact on missions today?
Find the probability that z lies : If z is a standard normal variable, find the probability that z lies between -2.41 and 0.
Find the average amount per claim for auto body repairs : An automobile insurance firm wants to find the average amount per claim for auto body repairs. Its summary records combine amounts
Identify suitable products that could used to resolve issues : Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues.
Please assist with the statistics question : Please assist with the following Statistics question: If an experiment is conducted with 5 conditions and 6 subjects in each condition, what are dfn and dfe?
Analysis of variance results : The analysis of variance results obtained from software are below. The significance level is 0.05 in testing the null hypothesis.
Discuss the role of cross-cultural workers in empowering : Discuss the role of cross-cultural workers in empowering and supporting local churches or church planting movements. Focus your answer on contexts outside.
How might the b&q approach to diversity encourage individual : How might the B&Q approach to diversity encourage individuals (both staff and customers) to contribute to the organisation's performance?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd