Summarize and describe any type of wireless network

Assignment Help Computer Network Security
Reference no: EM132290904

Objectives:

• Understanding Security Architecture of Wirless networks .
• Configuring TMG and implement NIS and IDS.

Tasks :
• Task 1: the Student need to submit a work proposal for this assignment.
• Task 2: the Student need to prepare a report based on three published research papers discussing wireless Security Architecture. The report should also base on reflective writing with proper referencing.
• Task 3: Student need to implement some security mechanisms in the TMG for some given requirements.

Task 1:

Submit a work proposal for this assignment which must include:
• Understanding of deliverables - a detail description of deliverables
• General overview of proposed plan - initial understanding of solution to all the tasks
• Timeline for assignment works
• Resources identified

Task 2:

Wireless Internet access technology is being increasingly deployed in both office and public environments, as well as by the Internet users at home. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. The wireless network can be found in different types, for example: wireless local area network (WLAN), Wireless Metropolitan Area Networks (WMAN), Wireless Personal Area Network (WPAN), wireless sensors networks (WSN).

Referring to at least three research papers, Student is required to study a wireless network architecture and recommend a security architecture by answering the following tasks:

Task 2.A: summarize and describe any type of wireless network.

(Hint: you should include definition, uses, and structure of your selected wireless network)

Task 2.B: Analyze and describe different security concerns (threats, vulnerabilities, attacks) of your selected wireless network.

(Hint: identify and describe the threats, vulnerabilities and attacks on your selected wireless network, describe the scenario of each attack and its effect on wireless network performance. Also clarify the attacks by diagrams)

Task 2.C: Suggest security services and mechanisms to countermeasure the attacks. Provide a detailed description for each service and mechanism. Then, provide a clear diagram of your security architecture of wireless network.

(Hint: identify the security service that could detect/prevent the attack, then describe mechanisms to implement the identified services.)

Task 3:
You are the network administrator for ABC Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 7am to 5pm. The company has the following requirements:

1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 192.168.0.10 to 192.168.0.28.. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 15 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures. In case of anomalies protocols the traffic should be allowed to avoid blocking legitimate traffic.

2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb, IP half scan and port scan attacks. DNS length overflow should be also detected. TMG should deny packets with the Time stamp and Loose Source Route during the IP filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.

You are required to complete the following configuration

a. Configure network Inspection System (NIS) as following :
• Configure an exception named ‘admin server'' for the NIS
• Configure the excepted IP addresses range to be 192.168.0.10 to 192.168.0.28.
• Configure the signature update to be every 15 minutes, and trigger alert if no update installed every 5 days.
• Make the response to anomalies protocols according to the company requirements.

b. Configure an intrusion detection System (IDS):
• Enable detection for Ping of death, UDP bomb, IP half scan attacks and port scan attacks.
• Enable detection for all types of DNS attack.
• Configure Time stamp and Loose Source Route during the IP options filtering.
• Block packets containing IP fragments.
• Configured SIP parameter according to the company's requirements.

Attachment:- Network Security (COMP 30019).rar

Verified Expert

This assignment is based upon Network Security and their types.As we know its very popular how to secure our network. And also discuss the configuration of NIS and DIS.

Reference no: EM132290904

Questions Cloud

Control chart is the right tool for quality conformance : Describe a situation where a control chart is the right tool for quality conformance.
Deal with possibility that customer satisfaction : As a manager, how would you deal with the possibility that customer satisfaction does not always lead to customer retention?
Firewalls have the capability to block both ingress : Firewalls have the capability to block both ingress (inbound) and egress (outbound) traffic. Many organisations (and also true for my home NBN router)
Organizations have mandates in place : Organizations have mandates in place that should help deal with these problems and opportunities.
Summarize and describe any type of wireless network : Network Security (COMP 30019) - Middle East College - Summarize and describe any type of wireless network - Analyze and describe different security concerns
Describe what is codependence in detail : Substance-abuse problems not only affect the user but also his or her family and relationships. Write a report that addresses the effects of substance abuse.
Write about Essential skills that makes great content writer : Assignment - Write about given topic. Topic - Essential skills that makes a great content writer
Define the key attributes of high-context culture : Define the key attributes of a high-context culture.
Capable of producing the desired quality output : Provide an example of a process that you feel is in control but might not be capable of producing the desired quality output.

Reviews

len2290904

4/22/2019 10:21:50 PM

Evaluation Criteria: • Zero marks will be awarded if student is absent for Viva. • The contribution of the student will also be evaluated during the Viva. Guidelines: Follow the guidelines mentioned below for your assignment: The document should be well presented and neatly done in (size A4) paper. Assignment should be submitted through Moodle (Turnitin). Handwritten assignments will not be accepted. Assignment should have a title page. Title page should contain the following information: o Title of the assessment, o Names of the student, o Student ID, o Session, o Department Name, o Semester Name, Academic Year It should have Table of Contents, references. Use page numbers Assignment should be computer typed using Calibri size 12 font and the Softcopy is to be submitted through Moodle(Turnitin). Heading should be with Font Size 14, Bold, Underline Use Diagrams and Examples to explain your topic. Copy paste from the Internet is strictly not acceptable. In-text citation and referencing using CU Harvard referencing Style. The students should scan and attach the completed declaration form which is given on the Moodle after signing.

len2290904

4/22/2019 10:21:22 PM

Submit a work proposal for this assignment on or before, which must include: ? Understanding of deliverables – a detail description of deliverables ? General overview of proposed plan - initial understanding of solution to all the tasks ? Resources identified ? Work proposal should be submitted in the form of word document in Moodle on or before 24th. • Assignment report submission 90 Marks Submit the assignment report on or before 29th, which must include:

len2290904

4/22/2019 10:21:13 PM

Evaluation Criteria: • Zero marks will be awarded if student is absent for Viva. • Student will be given 10 minutes for Viva. • The contribution of the student will also be evaluated during the Viva. • The evaluation will be done on the strength of analysis presented in the assignment: • Task 1: Assignment work proposal submission: 10 Marks

len2290904

4/22/2019 10:21:00 PM

Instructions to Student: • This is an individual assignment. • Present the relevant citation / references at the end of document • Marks will be awarded for the content written in your own words • Duplicate documents submitted will be treated as per MEC plagiarism policy. • All the tasks will be evaluated through viva. Students absent for viva will be awarded zero marks for the assignment. • Report must be uploaded on Moodle on or before the date of submission. • You can make use of the library resources to find information. Internet resources can also be used to search information.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd