Updated by: A/Prof Tony Jan XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2019 Assessment Details and Submission Guidelines Trimester T2 2019 Unit Code BN303 Unit Title Wireless Networks and...

1 answer below »
Bn303


Updated by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha August, 2019 Assessment Details and Submission Guidelines Trimester T2 2019 Unit Code BN303 Unit Title Wireless Networks and Security Assessment Type Group Assignment (3 Students in a Group) Assessment Title Design and implementation of secure enterprise wireless network Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes: d. Apply wireless network security techniques in the context of ethical implications; e. Design and implement secure enterprise wireless networks. Weight 20% Total Marks 100 Word limit 2000 - 2500 Due Date 11:55 PM 30th of September 2019 Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN303 Wireless Networks and Security Page # 2 of 4 Updated by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha August, 2019 Assignment Description You are hired to secure a wireless enterprise network. Your client wishes to build a secure wireless network where the visitors can access the Internet whilst their internal data is protected from the visitors or hackers. You are to provide a full report and demonstrate a prototype of network in a simulated platform (i.e. packet tracer or GNS3). Secure enterprise wireless local area networks can provide mobility and connectivity where wired connections are not practical. Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the malicious hackers to try and access confidential enterprise information. Recent advances in WPA2-Enterprise deployment include: installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise. The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator. In your report, you are to design and implement a secure enterprise wireless network, considering the ethical implications. You are required to complete the following tasks and submit a report on Moodle. 1. Discuss the ethical implications in the vulnerabilities of wireless network technologies. 2. Design a secure enterprise wireless network using the network simulator of your choice. 3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following CIAAA elements: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. 5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other’s terminals on the same network 6. Demonstration of your network prototype in Week 11 lab. The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group should be from the same lab. BN303 Wireless Networks and Security Page # 3 of 4 Updated by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha August, 2019 Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 5 Report Layout Report layout, style and language 5 Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network 10 Design secure enterprise wireless network Design a secure enterprise wireless network, employing packet tracer or GNS3. 15 Analyse secure enterprise wireless network Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 15 Implement secure enterprise wireless network Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. 20 Testing Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de- association, and pinging each other’s terminals on the same network 5 Demonstration Demonstration in Week 11 during the Lab. 15 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 100 Marking Rubric for Assignment #2: Total Marks 100 Grade Mark HD 80-100 DI 70-79 CR 60-69 P 50-59 Fail<50 excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. bn303 wireless networks and security page # 4 of 4 updated by: a/prof tony jan moderated by: dr sanjeeb shrestha august, 2019 explore ethical implications /10 finding is clearly linked and well justified finding is clearly linked and justified finding is linked and convincing finding is not linked and unjustified finding is not available design secure enterprise wireless network /15 demonstrated excellent ability to think critically and present an exceptional design considering all the requirements demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s demonstrate d good ability to think critically and present a good design considering all the requirements. demonstrated ability to think critically and present a design did not demonstrate ability to think critically and present a design. analyse secure enterprise wireless network /15 excellent analysis included wpa2 and radius and covered all aspects. good analysis included wpa2 and radius and covered some aspects. good analysis included wpa2 and radius some analysis provided and included wpa2 and radius lacking analysis of wpa2 and radius. implement secure enterprise wireless network /20 all elements are present and very well integrated. components present with good cohesive components present and mostly well integrated most components present proposal lacks structure. testing /5 testing was successful between client and ap. all required snapshots attached testing was successful between client and ap. some snapshots attached testing was successful between client and ap. few required snapshots attached testing was partially successful between client and ap. all required snapshots attached testing was not successful. demonstration /15 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction demonstration is confused and disjointed conclusion /5 logic is clear and easy excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" report="" layout="" 5="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used.="" poor="" report="" layout,="" style="" and="" language="" used.="" bn303="" wireless="" networks="" and="" security="" page="" #="" 4="" of="" 4="" updated="" by:="" a/prof="" tony="" jan="" moderated="" by:="" dr="" sanjeeb="" shrestha="" august,="" 2019="" explore="" ethical="" implications="" 10="" finding="" is="" clearly="" linked="" and="" well="" justified="" finding="" is="" clearly="" linked="" and="" justified="" finding="" is="" linked="" and="" convincing="" finding="" is="" not="" linked="" and="" unjustified="" finding="" is="" not="" available="" design="" secure="" enterprise="" wireless="" network="" 15="" demonstrated="" excellent="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirements="" demonstrat="" ed="" good="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirement="" s="" demonstrate="" d="" good="" ability="" to="" think="" critically="" and="" present="" a="" good="" design="" considering="" all="" the="" requirements.="" demonstrated="" ability="" to="" think="" critically="" and="" present="" a="" design="" did="" not="" demonstrate="" ability="" to="" think="" critically="" and="" present="" a="" design.="" analyse="" secure="" enterprise="" wireless="" network="" 15="" excellent="" analysis="" included="" wpa2="" and="" radius="" and="" covered="" all="" aspects.="" good="" analysis="" included="" wpa2="" and="" radius="" and="" covered="" some="" aspects.="" good="" analysis="" included="" wpa2="" and="" radius="" some="" analysis="" provided="" and="" included="" wpa2="" and="" radius="" lacking="" analysis="" of="" wpa2="" and="" radius.="" implement="" secure="" enterprise="" wireless="" network="" 20="" all="" elements="" are="" present="" and="" very="" well="" integrated.="" components="" present="" with="" good="" cohesive="" components="" present="" and="" mostly="" well="" integrated="" most="" components="" present="" proposal="" lacks="" structure.="" testing="" 5="" testing="" was="" successful="" between="" client="" and="" ap.="" all="" required="" snapshots="" attached="" testing="" was="" successful="" between="" client="" and="" ap.="" some="" snapshots="" attached="" testing="" was="" successful="" between="" client="" and="" ap.="" few="" required="" snapshots="" attached="" testing="" was="" partially="" successful="" between="" client="" and="" ap.="" all="" required="" snapshots="" attached="" testing="" was="" not="" successful.="" demonstration="" 15="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" demonstration="" is="" confused="" and="" disjointed="" conclusion="" 5="" logic="" is="" clear="" and="">
Answered Same DaySep 23, 2021BN303

Answer To: Updated by: A/Prof Tony Jan XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha August, 2019 Assessment...

Amit answered on Sep 28 2021
150 Votes
Title of the assignment: Group assignment
Student’s name:
Student ID:
Professor’s name:
Course title: BN303 Wireless network and security
Date: 9/28/2019
Table of Contents
1.    Introduction    3
2.    Ethical implications for vulnerabilities in wireless technologies    4
3.    Packet tracer based secured wireless design    5
4.    Analysis of secured wireless network with RADIUS and WAP2 server    7
5.    Wireless network testing and impl
ementation    10
6.    Conclusion    15
7.    References:    17
1. Introduction
The changing technologies in present time frame need effective communication and any bound of physical connectivity is not accepted. The clients of modern time make requirements of wireless networks with their wired network. Providing network access to visitors is most common thing in these days and normal places like coffee shops, pizza huts etc. can be visited for checking such wireless network implementations. Most of the client organizations allow internet access to their visitors but the access to internal data storage is never allowed to any visitor. The implementation of such wireless network requires strong authentication. The advantage of mobility is mainly archived by the clients using wireless network. The conference rooms, common area where the visitors normally visit makes use of this type of wireless networks [1]. This wireless network can also be used by enterprise employees but using the internal database requires strong authentications. Providing wireless access to each visitor increases the chances of malicious attacks on the network, so, following the CIAAA standards becomes essential for such open wireless networks. The specific locations of the client organization provide this wireless connectivity. The use of RADIUS and WAP2 servers can maintain these authentication requirements for developing the secured wireless network. The remote authentication, encryption implementation, wireless protocol implementation, encryption implementation and secured connectivity based on client OS can be maintained with these servers. The implementation of such wireless network for visitors requires defining the ethical values for visitors and client organization as well. The use of access points for developing secured network shows the role of ethical values. So, the development of wireless network for client organization requires different considerations and based on these important considerations, the packet tracer based wireless network is proposed here.
2. Ethical implications for vulnerabilities in wireless technologies
The implementation of wireless network for visitors to any organization requires high ethical values from visitors and network service providing organization as well. The use of wireless devices is increased and this increased use also requires high ethics towards the service provider. The identified ethical implications for vulnerabilities in wireless technologies of client office are supplied below:
1. The implementation of wireless network does not maintain any legal rules for downloads and other works. The visitors may consider the ethical values while downloading any things [2]. The provided wireless network services are for important works not to download any music or video files.
2. The visitor must consider the privacy issues and vulnerabilities while using the wireless network. The visitors are expected to maintain the ethical values to holding the privacy of the wireless network.
3. Node scanning is very critical for wireless network to each visitor. The performed operations on client organizations wireless network by any visitor must not perform any illegal or unethical work.
4. The visitors must not visit the adult websites through provided wireless network at client organization. Visiting such websites can cause serious attacks on the wireless network of client organization. The ethical values of visitors will not allow him / her to visit such websites.
5. The visitors are also expected to maintain the ethical values of not performing any hacking attack on the provided wireless network. Any hacking attack with provided services of wireless network at client organization will cause vulnerabilities to ethical values.
6. Some of the visitors try to create duplicate AP at client organization for...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here