Wireless lan vulnerabilities assessment

Assignment Help Computer Network Security
Reference no: EM133468717 , Length: word count:4000

Wireless networks & Security

Learning outcome 1: Understand the global nature of WLAN standards and design.

Learning outcome 2: Be able to describe, explain critically and assess wireless and mobile data communication technologies deployed along with associated security issues.

Learning outcome 3: Apply suitable security measures to protect wireless networks against known weaknesses

Learning outcome 4: Demonstrate their ability to work in culturally diverse groups and teams and make appropriate and personal contributions to team effectiveness

 

Assignment - Wireless LAN vulnerabilities assessment

You are to perform a study on various 802.11 wireless networks in order to choose a suitable security measure that should be put in place for a given scenario.

This assignment is divided in two parts. The study will be partially theoretical and technical. The technical part (part A) will requires you to evaluate the effectiveness of using various standards against known attacks. You will then in part B identify what are the security measures that the company in the chosen scenario should consider implementing.

Part A: Technical flaws research

You will need to investigate several known security flaws on the various 802.11 security protocols. You should demonstrate that were able to exploit those security flaws by exploiting them in your test environment either at home or in the lab.
You should also consider the various possible types of deployment such as in infrastructure deployment of 802.11 or in enterprise mode.

1. WLAN authentication if SSID is hidden and if administrators use MAC filtering.
2. WLAN encryption flaws (WEP, WPA2).
3. 802.11 clients and identify flaws and they can be exploited.

Part B: Scenario based interpretation

Based on your findings in part A, you are required to analyse results obtained and choose suitable security measures for your chosen scenario. Following this, you are expected to defend your security choices by comparing your justifications with different research papers discussing the effectiveness of wireless security protocols in different environments.

Effectiveness of the chosen security measures should be evaluated in term of how they can be exploited (if possible), how suitable they are for the environment they will be used in and the threats that the scenario is subject to.
You will need to choose one scenario from the list below:

• A small company that only allows staff to access the network.
• A coffee shop that allows its customers to access the wireless network.

• A large company that has various levels of access controls in their company.
• Guests only network where people can use the network for a specific time.
• A home family wireless network.

Instructions

• You are required to use the template available in assessment page (IEEE template)
• You are expected to use research papers and reference them in your document.

Reference no: EM133468717

Questions Cloud

Consider how well they justified their positions : Did they support their position convincingly with appropriate resources? - Which of their points make the most sense to you, even if you made a case for
Gives an overview and definition of the topic you chose : Gives an overview and definition of the topic you chose. At the end of the paragraph it gives an idea of how your forum is organized.
Are there risks that technical failures : Are there risks that probation will become too dependent on technology through such methods as supervision kiosks, for example, and thereby fail to devote
Summarize the source and discuss the research study : For all sources used in your Discussion you should: Summarize the source and discuss the research study that was conducted and what the findings were.
Wireless lan vulnerabilities assessment : LD7008 Wireless networks & Security, Northumbria University - Understand the global nature of WLAN standards and design.
Do judges know enough about the causes of criminal behavior : Do judges know enough about the causes of criminal behavior to accurately apply information from the EBS process to their attempts to tailor an appropriate
Symptoms you would look for when diagnosing disorder : Bulmia -describe the disorder. Tell what signs and symptoms you would look for when diagnosing the disorder.
Demonstrate concepts related to basic cryptography : LD7007 Network Security, Northumbria University - Develop an in-depth understanding of fundamental concepts and challenges in data and network security
Project information needs to be communicated to stakeholders : Evaluate what type of project information needs to be communicated to stakeholders. Propose the methods and steps used in creating a project communication plan.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means

  CMT116 Cybersecurity and Risk Management Assignment

CMT116 Cybersecurity and Risk Management Assignment Help and Solution, Cardiff School of Computer Science and Informatics - Assessment Writing Service

  CECT5804 Penetration Testing and Incident Response

CECT5804 Penetration Testing and Incident Response Assignment Help and Solution, De Montfort University - Assessment Writing Service

  Describe privacy issues that affect users of the www

Describe privacy issues that affect users of the WWW. Are privacy violations the same as data breaches?

  What major security programs or initiatives are in place

What are your organization's security-focused strategic objectives? What major security programs or initiatives are in place?

  Potential weaknesses in the companys security posture

The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner

  Assessment plan of the applications for network performance

Assessment plan of the applications for network performance - Students can demonstrate in a group of 2. Students should be ready with all setup

  Create a weighted ranking according to your own evaluation

Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

  Discuss the role of VPN to the security of businesses

MIT Australia - BN305 Virtual Private Networks Assignment - SSL/TLS VPN Technologies. Discuss the role of VPN to the security of businesses

  Write a reseach paper on host intrusion detection systems

Write a reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks shows.

  Characterised as continuous improvement

Which of the following courses of action is most correctly characterised as a continuous improvement?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd