Implementation of authentication process

Assignment Help Basic Computer Science
Reference no: EM132428128

Implementation of Authentication Process

Learning Objectives and Outcomes

- Design and document a secure wireless local area network (WLAN) authentication process.

Assignment Requirements

Other than the Internet, probably no aspect of technology will have more impact on the classroom than the wireless local area network (WLAN), which may soon become as indispensable to the educational mission as chalkboards and textbooks. In the 21st century, technological literacy will be a primary determinant of whether a student succeeds or fails later in life. The ability to access and work with a wide range of information technology (IT) applications will be critical to ensuring this literacy. The benefits of a pervasive wireless fidelity (Wi-Fi) deployment in primary and secondary education include:

Infrastructure Flexibility: School districts' learning technology needs can be as unpredictable as class sizes. A WLAN can be quickly rolled out virtually anywhere, without the need for extensive retrofitting of existing infrastructure.

Speed: Classroom productivity is measured in terms of how much can be taught in a short period of time. Students can access a WLAN-enabled learning environment in a matter of seconds, without special connections, transmission control protocol/Internet protocol (TCP/IP) changes, or a tangle of cables. Teachers can focus on teaching and students can focus on learning.

Resource Mobility: A WLAN allows technology-learning tools such as laptops to be moved to wherever students are, rather than vice-versa. This makes the concentration of mobile computing resources possible in a single classroom while maximizing hardware utilization and a return on the investment.

Deploying WLAN in the classroom can bring enormous benefits, but there are some unique challenges to this environment. For a start, school IT staff is often stretched thin by the support demands of a large number of users, so the WLAN solution cannot require time-intensive configuration and administration. Schools also pose wireless coverage challenges because of the conflict between their sprawling layouts and the need to provide connectivity to multiple users in the confined area of a classroom. In addition, given the uncertainties of the school budget process, WLAN deployment costs must be kept low, leveraging existing infrastructure where possible, and offering advantages in terms of scale and price.

After reading the given information on the requirements of a school's WLAN, your task for this assignment is to prepare a professional report. The report should focus on the following:

1. Identify the potential user groups and users of WLAN in a school environment.

2. Assess the WLAN for probable risks in a school environment.

3. Specify security requirements by user class or type.

4. Mock-up a simplified data classification plan.

5. List and justify particular applications and protocols that should be allowed on the WLAN.

6. Determine whether personal digital assistants (PDAs) should be allowed to access the WLAN.

Reference no: EM132428128

Questions Cloud

The use of encryption can have adverse effects : The use of encryption can have adverse effects on incident response and incident investigations; however, from a security standpoint,
Discuss shared technology vulnerabilities in the cloud : Discuss Shared technology vulnerabilities in the cloud. What policies should be in place for users to help reduce cloud based threats?
Databases are important in businesses and organizations : Databases are important in businesses and organizations because they provide a highly efficient method for handling data.
Discuss the web interoperability including its advantages : Considerations include usability, accessibility and interoperability of web pages and web services. Discuss the web interoperability including its advantages.
Implementation of authentication process : Design and document secure wireless local area network authentication process. Justify particular applications and protocols that should be allowed on the WLAN
Necessitates the enactment or establishment of federal : What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws,
Articles on telecommuting and other blue work strategies : Find research articles on telecommuting and other "Blue Work" strategies. discusses the latest research in whether these strategies they are effective or not.
Explain how it can be used for IT Auditing : What are processes of auditing Group policies in your organization-organization you know? List 3 Auditing tools and explain how it can be used for IT Auditing.
Root causes that necessitates enactment : What are issues and root causes that necessitates enactment and/or establishment of Federal, state and local government laws and establishment of regulations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How you would represent one of these concerns as an aspect

Discuss how you would represent one of these concerns as an aspect.

  New system that is being implemented

What would you include in a system training plan to help reduce the stress and give employees confidence in an new system that is being implemented?

  What is the difference between the definitions of measures

What kind of measurement scales (ratio, interval, etc.) characterizes the following software measures.

  Floating point numbers in scientific notation

Floating point numbers in scientific notation represents numbers as a base number and an exponent. For examples: 2E3, 2.0E12, 3.14E+12, 3.14E-12. Give a grammar that generates floating point numbers. Use your grammar to derive 3.14E+12.

  Write a function to find the ith node on a skip list

Complete the implementation of the Skip List-based dictionary begun in Section 16.3.1

  Design a lightening circuit for a shopping mall

It is required to design a lightening circuit for a shopping mall. The requirement is that the lights may be switched on or off from any one of three points. Set up a truth table for the problem and derive the corresponding switching equation. Sim..

  Cloud-based file synchronization

How is backup data files different from a cloud-based file synchronization?

  Identify the null hypothesis and the alternative hypothesis

a. Identify the null hypothesis and the alternative hypothesis. b. Determine the test statistic.

  Europe export regulations for encryption equipment

The U.S. and Europe Export Regulations for Encryption Equipment and International Cryptography Regulation Ethic issue with use cryptography

  Knowledge about the programming language c

The above segment descriptor describes a memory segment in terms of its start address, its size and whether it is ALLOCATED or FREE. This descriptor is part of a list (contains a pointer to next segment descriptor). Initially, there is only one se..

  State program combating proliferation of drugs

Explain how you would use data available to you to prepare a report for the Governor for the State Program "Combating Proliferation of Drugs."

  Risk management paper for the healthnet company

Information Security and Risk Management. Write the final Risk Management Paper for the HealthNet company. Identify assets and Activities to be protected

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd