Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN603 Unit Title Wireless...

1 answer below »
Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
Assessment Details and Submission Guidelines
Trimester T1 2018
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type
Assignment 2: Group Assignment
Assessment
Title
Design and implementation of secure enterprise wireless network
Purpose of the
assessment
(with ULO
Mapping)
The purpose of this assignment is to design and implement a secure enterprise
wireless network, considering the ethical implications. The assignment covers
the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in
consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.
Weight 20%
Total Marks 100
Word limit XXXXXXXXXX
Due Date XXXXXXXXXX/05/2018 11:55PM
Submission
Guidelines
ï‚· All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
ï‚· The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
ï‚· Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension ï‚· If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct

ï‚· Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.




http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN603 Wireless Networks and Security Assignment 2 Page # 2 of 4

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
Assignment Description

Enterprise wireless LAN deployments have skyrocketed in recent years, evolving from guest access in
conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the
organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just
plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless
LAN is not hard – industry advances in technology and vendor innovation makes this easier than ever.

Default settings for most access points do not include any form of security being enabled. This is the most
common reason that wireless LANs are hacked or used by unauthorized personnel. When deployed,
immediately turn a method of over-the-air security on.

For enterprises, it is recommended that the most secure over-the-air encryption and authentication method
e used – either IEEE 802.11i or a VPN. IEEE 802.11i, also known as WPA2 when the access point is certified
y the Wi-Fi Alliance, uses IEEE 802.1x for mutual authentication between the client and the network and AES
for data encryption.

Its predecessor was WPA, an interim form of security certified by the Wi-Fi Alliance while the 802.11i standard
was still being ratified. WPA also uses 802.1x for authentication, but TKIP for encryption. While AES is
considered the stronger encryption method, it is worth noting that WPA has never been cracked. 802.11i,
WPA2 and WPA require the use of a RADIUS server to provide the unique, rotating encryption keys to each
client.

This assignment requires the students to design and implement a secure enterprise wireless network,
considering the ethical implications. The students are required to complete the following tasks and submit a
eport on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless
network.

2. Design a secure enterprise wireless network, employing Boson Netsim.


3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the
following aspects:

a. Authorization
. Authentication
c. Integrity
d. Network eavesdropping prevention


4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Demonstration in Week 11 during the Lab.

The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group
should be from the same lab.




MN603 Wireless Networks and Security Assignment 2 Page # 3 of 4

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
Marking criteria:
Section to be included in
the report
Description of the section Marks
Introduction Outline of the report ( in 3-4 sentences) 5
Report Layout Report layout, style and language 5
Explore ethical
implications
Investigate and report the ethical implications in the
design and implementation of a secure enterprise
wireless network
10
Design secure enterprise
wireless network
Design a secure enterprise wireless network, employing
Boson Netsim.
20
Analyse secure
enterprise wireless
network
Analysis of a secure enterprise wireless network using
WPA2 and the RADIUS server, considering the following
aspects:
a. Authorization
. Authentication
c. Integrity
d. Network eavesdropping prevention
20
Implement secure
enterprise wireless
network
Implementation of a secure enterprise wireless network
using WPA2 and the RADIUS server.
20
Demonstration Demonstration in Week 11 during the Lab. 10
Conclusion Write summary of the report 5
Reference style Follow IEEE reference style 5
Total 100
Marking Ru
ic for Assignment #1: Total Marks 10
Grade
Mark
HD
80-100
DI
70-79
CR
60-69
P
50-59
Fail
50
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction

5
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
elevant and
soundly
analysed.
Generally
elevant and
analysed.
Some relevance
and
iefly
presented.
This is not
elevant to the
assignment
topic.
Report Layout

5
Exceptional report
layout, style and
language used
Very good
eport
layout, style
and
language
used
Good report
layout, style
and language
used
Acceptable
eport layout,
style and
language used.
Poor report
layout, style
and language
used.
Explore ethical
implications
10
Finding is clearly
linked and well
justified
Finding is
clearly
linked and
justified
Finding is
linked and
convincing
Finding is not
linked and
unjustified
Finding is not
available
Design secure
enterprise
wireless
network
Demonstrated
excellent ability to
think critically and
present an
Demonstrat
ed good
ability to
think
Demonstrate d
good ability to
think critically
and present a
Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
MN603 Wireless Networks and Security Assignment 2 Page # 4 of 4

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
20 exceptional design
considering all the
equirements
critically and
present an
exceptional
design
considering
all the
equirement
s
good design
considering all
the
equirements.
present a
design.
Analyse secure
enterprise
wireless
network

20
Excellent analysis
included WPA2
and RADIUS and
covered all
aspects.
Good
analysis
included
WPA2 and
RADIUS and
covered
some
aspects.
Good analysis
included WPA2
and RADIUS
Some analysis
provided and
included WPA2
and RADIUS
Lacking analysis
of WPA2 and
RADIUS.
Implement
secure
enterprise
wireless
network

20
All elements are
present and very
well integrated.
Components
present with
good
cohesive
Components
present and
mostly well
integrated
Most
components
present
Proposal lacks
structure.
Demonstration

10
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Demonstration
is confused and
disjointed
Conclusion

5
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference style

5
Clear styles with
excellent source of
eferences.
Clear
eferencing
style
Generally good
eferencing
style
Sometimes
clear
eferencing
style
Lacks
consistency
with many
e
ors
Answered Same Day May 08, 2020 MN603

Solution

Amit answered on May 23 2020
151 Votes
Title of the assessment:
Names of the student:
Student ID:
Session:
Department Name:
Semester Name:
Academic Year:
Date:
Table of Contents
1.    Introduction    3
2.    Ethical implications of secured wireless network for any organization    3
3.    Wireless network development with Boson Netsim    4
4.    Security analysis and implementation of wireless network through RADIUS server and WPA2    13
5.    Conclusion    14
6.    References:    15
1. Introduction
The fast acceptance of wireless networks in different modern enterprises involves the network security as the major dimension against the vulnerabilities caused by different intruders and hackers. The use of handhelds increases the development of wireless networks for different applications and their required data. As the extension of some wired network, wireless network provides improvements and better response to its customers from bottom line. The security of wireless network is considered by deployed security policy, deployed security to network, security to Ethernet, security from outside threats, and educating users with respect to wireless policy. So, development and maintaining the security of wireless network is most critical task for a network administrator in modern enterprises [Wright, 2015].
2. Ethical implications of secured wireless network for any organization
The development of proper security related to wireless network is considered as the most important aspect in modern enterprises. The implementation of wireless network in any enterprise has certain possible legal as well ethical implications for network administrator and end user. For developing the wireless network for any enterprise, 802.11x standard developed by IEEE is being mostly used. In these networks, client machines use the AP (Access points) to make their connectivity with developed network. The AP of any wireless network provides central services to end users. The BSS (Basic Service Set) is being used by these AP’s for communication services. The client machines can over pass these BSS, and can use IBSS for making independent and peer based direct connections. This is not ethical that client overpass the developed AP of any wireless network.
Thus, the development of wireless network has associated ethical security implications which require considerations for end users. The points showing such ethical implications of secured wireless network for any enterprise are listed below:
1. The maintenance of confidentiality is the main ethical implication in wireless network. The end user of wireless network is responsible to maintain the confidentiality of network credentials [Rodríguez, 2015].
2. The following of developed WEP (Wireless Equipment Privacy) by end user is also an ethical implication towards network.
3. There are nea
y 16 million different initialization vectors are being used in 32 bit IPv4. In any wireless network, so many different data packets are travelling at the same time. Any hacker can make a watch on repeated data packets based on the vector length. So, it is ethical duty of end user, not to make transfer of data packets of same size continuously on used wireless network.
4. The encryption of RC4 is mostly used in development of wireless networks. The RC4 is a mathematical algorithm, so, hackers can use this RC4 for finding the WEP key. So, it is ethical duty of network administrator to make regular updating and required changes in developed WEP key.
5. The WEP developed for any wireless network has no management of key for improved security of wireless network. It is a time consuming process to change the keys for developed AP’s and connected clients of any wireless network. But is an ethical duty of network administrator to make regular changes and different keys for each user.
6. The developed AP’s of wireless network can be hacked by intruders which may cause network jamming, DOS attack and SYN flood. So, maintaining availability of wireless network under these attacks is big challenge for network administrator. The use of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here