BN303 assignment 2
Prepared by: Dr Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 Assessment Details and Submission Guidelines Trimester T1 2021 Unit Code BN303 Unit Title Wireless Networks and Security Assessment Author Associate Professor Tony Jan Assessment Type Group Submission Assessment Title Secured design of wireless LAN Unit Learning Outcomes covered in this assessment Students will be able to complete the following ULOs: a. Explain wireless communication protocols; b. Utilise standards-based technologies used in various networks; d. Apply wireless network security techniques in the context of ethical implications; e. Design and implement secure enterprise wireless networks. Weight 30% of total assessment Total Marks 50 Word limit Minimum 1500 - Maximum 2000 Due Date 03/June/2021 11:59 PM Submission Guidelines ● All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ● The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ● Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct ● Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and- guidelines/AcademicintegrityPolicyAndProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 Assignment Description: Design and implementation of wireless LAN for a small company with necessary tools and techniques to evaluate wireless network security. You are a network security engineer at the UniQoo Design Pty Ltd in Brisbane, Australia. The company houses more than 500 freelancer designers who often travel to the premise to hold a meeting with business clients. The designers need to have their creative products available on the Cloud as well as on their personal laptops so that they can demonstrate their works to their clients. Recent cyberattacks on Australian companies have heightened the concern for UniQoo Design, as a number of their competitions reported their ill fate of losing valuable creative assets due to the cybersecurity attacks. Your task, as a network security engineer, is to provide convenient Internet access for the visitors/business partners while maintaining a high level of security for internal staff, including designers. As the number of internal team is large, a remote authentication server is pivotal to successful security operations. In this assignment, your project is to install WLAN for the CBD premise for UniQoo Design. In this project, you will analyse the threat landscape to check the potential attacks, and design and implement appropriate wireless network architecture for a secure and convenient business computing environment. The requirements include; internal data network to provide wired access to staff members or administrative officers for faster and secure connection to their design data, and free Internet access for visitors and business clients who are visiting the premise. Your objective is to fulfil accessibility, connectivity and availability of wireless network with the high level of security. You need to investigate a set of tools including WAP or WAP2 to provide high level of wireless security. The details should include technologies in IEEE802.11a/b/g/n and IEEE802.11x authentication in wireless LANs. Requirements For this project, you will design the network as specified in the above scenario from scratch. You have to submit a group report and specify each individual group member’s contribution on the front page. You should also address the following tasks in your report: ● Design of a simple mock business computing network schematics (using Packet Tracer or other simulator) ● Discussion of threats in business computing environment (what are the potential attacks to your business) ● Wireless network security design using WPA or WPA2 technique with the support of 802.1X Followed by: ● Evidence of deployment of wireless network and its security solution using WAP or WAP2 (on Packet Tracer or other simulation platforms) ● Segregation of free Internet access network from Internal data network by various levels of security grouping o Admin access Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 o Designer access o Visitor access Or any other groups you consider appropriate (e.g. marketing team) Evidence your system has been secured in confidentiality, integrity and availability. All group members: Write a report that includes the following sections: abstract, introduction, proposed design, evidence implementation (on simulator), followed by conclusion and reflection in terms of data ethics. Marking criteria: Marks are allocated as indicated on each question, taking the following aspects into account: Note: The marking criteria varies for each assignment Section to be included in the report Description of the section Marks Abstract Aims and objectives of this report 2 Introduction History of WLAN, network components, and outline of report. 10 Threat Analyse Report on threat landscapes for the case study network 10 Design Create a design of the proposed solution with suitable diagram or figures 10 Implementation Provide evidence of your implementation on a simulated environment 10 Evaluation/justification Evaluate your proposed solutions and write justification of your evaluation 5 Conclusion and reflection Briefly summarized the outcomes of the work using 2/3 sentences with reflection on ethical concerns in wireless data network 2 Reference style Follow IEEE reference style 1 Total 50 Example Marking Rubric for Assignment #: Total Marks 50 Note: The marking rubrics varies for each assignment Grade Mark HD 40-50 DI 35-44 CR 30-34 P 25-29 Fail<25 excellent very good good satisfactory unsatisfactory abstract /2 clearly written the goal of the work soundly written the goal of the work usually written the goals briefly presented the goals did not mention the goal introduction /10 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. analyse /10 logic is clear with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is not clearly stated prepared by: tony jan moderated by: dr. sanjeeb shrestha march 2021 design /10 all elements are present with required diagram. components present cohesively components present and mostly well integrated most components present poor proposed design. implement /10 exceptional implementation good implementa tion useful implementatio n acceptable implementation poor or no implementatio n evaluate/justifi cation /5 excellent comparison is made throughout this section. outstanding execution is made evaluate very good way good effort to evaluate but limited comparison little bit effort for comparison through web search. poor attempt to justify conclusion /2 summarized the concept logically with strong arguments consistency logical and convincing good presentation of the summary moderate summary of the work. failed to summarize the work. reference style /1 excellent reference style according to ieee and most are relevant and recent good reference according to ieee but some are old adequate reference most are old mix of reference style and old error in the reference style according of iee and majority are irrelevant. excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" abstract="" 2="" clearly="" written="" the="" goal="" of="" the="" work="" soundly="" written="" the="" goal="" of="" the="" work="" usually="" written="" the="" goals="" briefly="" presented="" the="" goals="" did="" not="" mention="" the="" goal="" introduction="" 10="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" analyse="" 10="" logic="" is="" clear="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" not="" clearly="" stated="" prepared="" by:="" tony="" jan="" moderated="" by:="" dr.="" sanjeeb="" shrestha="" march="" 2021="" design="" 10="" all="" elements="" are="" present="" with="" required="" diagram.="" components="" present="" cohesively="" components="" present="" and="" mostly="" well="" integrated="" most="" components="" present="" poor="" proposed="" design.="" implement="" 10="" exceptional="" implementation="" good="" implementa="" tion="" useful="" implementatio="" n="" acceptable="" implementation="" poor="" or="" no="" implementatio="" n="" evaluate/justifi="" cation="" 5="" excellent="" comparison="" is="" made="" throughout="" this="" section.="" outstanding="" execution="" is="" made="" evaluate="" very="" good="" way="" good="" effort="" to="" evaluate="" but="" limited="" comparison="" little="" bit="" effort="" for="" comparison="" through="" web="" search.="" poor="" attempt="" to="" justify="" conclusion="" 2="" summarized="" the="" concept="" logically="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" good="" presentation="" of="" the="" summary="" moderate="" summary="" of="" the="" work.="" failed="" to="" summarize="" the="" work.="" reference="" style="" 1="" excellent="" reference="" style="" according="" to="" ieee="" and="" most="" are="" relevant="" and="" recent="" good="" reference="" according="" to="" ieee="" but="" some="" are="" old="" adequate="" reference="" most="" are="" old="" mix="" of="" reference="" style="" and="" old="" error="" in="" the="" reference="" style="" according="" of="" iee="" and="" majority="" are="">25 excellent very good good satisfactory unsatisfactory abstract /2 clearly written the goal of the work soundly written the goal of the work usually written the goals briefly presented the goals did not mention the goal introduction /10 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. analyse /10 logic is clear with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is not clearly stated prepared by: tony jan moderated by: dr. sanjeeb shrestha march 2021 design /10 all elements are present with required diagram. components present cohesively components present and mostly well integrated most components present poor proposed design. implement /10 exceptional implementation good implementa tion useful implementatio n acceptable implementation poor or no implementatio n evaluate/justifi cation /5 excellent comparison is made throughout this section. outstanding execution is made evaluate very good way good effort to evaluate but limited comparison little bit effort for comparison through web search. poor attempt to justify conclusion /2 summarized the concept logically with strong arguments consistency logical and convincing good presentation of the summary moderate summary of the work. failed to summarize the work. reference style /1 excellent reference style according to ieee and most are relevant and recent good reference according to ieee but some are old adequate reference most are old mix of reference style and old error in the reference style according of iee and majority are irrelevant.>