Secure enterprise wireless network for an apartment block

Assignment Help Computer Networking
Reference no: EM132313469 , Length: word count:2500

Design and implementation of secure enterprise wireless network for an apartment block.

Purpose of the assessment

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network for an apartment block, considering the ethical implications and the requirements of a modern apartment block. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network for an apartment block.

2. Identify and analyse the requirements of an apartment block, considering the issues of multi dwelling and justify the use of WLANs in this scenario

3. Design a secure enterprise wireless network for an apartment block, employing a standard industry tool.

4. Analysis of the secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Security
e. Privacy

5. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server for an apartment block.

6. Demonstrate the network security against attacks.

7. Demonstration in Week 11 during the Lab.

The tutor will assign the groups; maximum number of students in a group is 4 and minimum. The students in each group should be from the same lab. Each member of the group will be assessed individually in the demonstration.

Reference no: EM132313469

Questions Cloud

Assessing whether a contract was formed : What factors and contractual elements will you consider in assessing whether a contract was formed?
Identify the importance of leadership qualities for managers : LEMT305 Leadership for Managers Assignment - Self-Reflective Journal, Kent Institute, Australia. Identify the importance of leadership qualities for managers
Do you feel less safe that businesses can track : Do you feel less safe that businesses can track your activities on the internet? Should legislation be put in place to protect consumers from the internet?
Workplace behaviour unless they can prove what : An employer can be held liable for any unlawful workplace behaviour unless they can prove what?
Secure enterprise wireless network for an apartment block : Design and implementation of secure enterprise wireless network for an apartment block - Apply and evaluate wireless network security techniques
Paris convention and patent cooperation treaty of 1994 : China is now part of the Paris Convention and Patent Cooperation Treaty of 1994. Would you still trust your invention in this country?
Excel sheet of ms-drgs used for an annual report : How do you analyze an excel sheet of MS-DRGS used for an annual report, to put into corporate letter showing the potential liability
Wallace stevens poem the death of a soldier : Then analyze the view of war in poem with view of war in Faulkner's story "Two Soldiers." Your essay should be well- developed and well-supported with texts
How should the appeals court rule : Plaintiff shipped to Defendant-Pizza Pride Inc. of Jamestown, North Carolina-an order of mozzarella cheese totaling $11,000. That same day, Plaintiff mailed Def

Reviews

Write a Review

Computer Networking Questions & Answers

  Data model development and implementation

Data model development and implementation - Understand the fundamental principles of the networking and data requirements of a network

  Diane the consultant summary of case

Case study:Diane the consultant Summary of case : Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

  What would be your approach to assign ip address

If you have to choose only one class of an IP address college campus network, what class of IP address would you choose? Why?

  Design a simple layout of omni directional antennas

Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice and design a simple layout of omni directional antennas to cover the entire warehouse.

  Introduction to network channels-processors and media

OSI Model, Switching Systems, Network Channel Processors, and Media

  Optimize wireless security on an ap

Properly securing a wireless access point is not the kind of chore that most home users think to do. Some IT students have actually created businesses securing.

  Protecting data privacy across the wan

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transport..

  What is use of the mac and ip for vlan 1 in a cisco switch

Implement the network topology using Packet Tracer - How many MAC does the 24 port Cisco switch used in the Packet Tracer - How many MAC does the 24 port Cisco switch used in the Packet Tracer has and what is the use of the MAC and IP for VLAN 1 in ..

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Data transmission technologies associated with the protocol

Define each protocol and describe at least two data transmission technologies associated with the protocol.

  Identify different types of network topologies

Identify different types of network topologies. Explain when each is most applicable for use. Include speaker notes based on this overview. Format the completed slides and speaker notes in the presentation following APA guidelines.

  Create separate offices across the globe

Question 1: Discuss the latest implementations of routing protocols that would be used in the company's wide area network and the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd