Use of a WLAN Tools in an enterprise setting

Assignment Help Computer Networking
Reference no: EM132927441 , Length: 1500 Words

BN303 Wireless Network & Security - Melbourne Institute of Technology

Assessment - Use of a WLAN Tools in an enterprise setting

LO 1: Provide in-depth descriptions of wireless architecture and security vulnerabilities.
LO 2: Conduct research and gain knowledge about different sniffing tools
LO 3: Solve complex problems in secure wireless network designs.
LO 4: Help enterprises to maintain and implement a secure wireless network.

Assignment Description

This assignment include two tasks:

Task one: (research)

Students are required to choose four WLAN sniffing tools and write a maximum of 200 words about each tool to highlight:
- How tools work
o Level of complexity
- Included features
- Differences from other tools
- Advantages and disadvantages
- screen shots (one for each tool)
o install demo versions then take screen shots - online screen shots will not be considered

Task two:

Students are required to
1. Record WLAN access points at a public place (such as at a shopping centre, public place, home network etc. of your choice).
2. Gather technical information about wireless network at three different locations with minimum of 5 APs for each location.
3. Test the WLAN sniffing tool and report your observation and recommend how to
secure and/or manage WLAN. Your report should include:
a. Screenshots (as an evidence) and detail explanation to report working mechanism (the step by step process) of the identified technique.
b. Explain the use (evaluation) of the technique to secure and/or manage WLAN.
o Discuss dual bands and its advantages
o Security implications

4. Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video). Your video file format must be compatible with video playing software available in MIT labs.

Attachment:- Wireless Network.rar

Reference no: EM132927441

Questions Cloud

How do deal with the accusations : Which were part of the battle they were involved in," Hitz said. The question for the CIA officer in the field was, how do you deal with those accusations?
How much is this investment worth at the end of year four : You are able reinvest these cash flows at 3.62 percent, compounded annually. How much is this investment worth at the end of year four
What follows is a closer look at the hitz report : What follows is a closer look at the Hitz report, drawing on interviews with Frederick Hitz and others interviewed for FRONTLINE's "Drug Wars" series.
Job description at red lobster : Red Lobster operates over 670 casual-dining seafood restaurants in the US and Canada, employing more than 63,000 people. When Red Lobster developed a new busine
Use of a WLAN Tools in an enterprise setting : Provide in-depth descriptions of wireless architecture and security vulnerabilities and Use of a WLAN Tools in an enterprise setting
Design a survey for setting pay for welders : How would you design a survey for setting pay for welders? How would you design a survey for setting pay for financial managers? Do the issues differ?
How criminological theory might be used : How criminological theory might be used to analyze the criminal event or type of crime you selected. Identify the criminological theory and the criminal event
Measure the satisfaction level of participants : A group of employees attended a training program. After the program, the HR Manager wanted to measure the satisfaction of participants on the training program.
What role does the victim play in the sentencing process : What role, if any, does the victim play in the sentencing process? Analyze whether the impact of the crime on the victim should be a consideration

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd