Bn303
Updated by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha August, 2019 Assessment Details and Submission Guidelines Trimester T2 2019 Unit Code BN303 Unit Title Wireless Networks and Security Assessment Type Group Assignment (3 Students in a Group) Assessment Title Design and implementation of secure enterprise wireless network Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes: d. Apply wireless network security techniques in the context of ethical implications; e. Design and implement secure enterprise wireless networks. Weight 20% Total Marks 100 Word limit 2000 - 2500 Due Date 11:55 PM 30th of September 2019 Submission Guidelines All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN303 Wireless Networks and Security Page # 2 of 4 Updated by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha August, 2019 Assignment Description You are hired to secure a wireless enterprise network. Your client wishes to build a secure wireless network where the visitors can access the Internet whilst their internal data is protected from the visitors or hackers. You are to provide a full report and demonstrate a prototype of network in a simulated platform (i.e. packet tracer or GNS3). Secure enterprise wireless local area networks can provide mobility and connectivity where wired connections are not practical. Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the malicious hackers to try and access confidential enterprise information. Recent advances in WPA2-Enterprise deployment include: installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise. The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator. In your report, you are to design and implement a secure enterprise wireless network, considering the ethical implications. You are required to complete the following tasks and submit a report on Moodle. 1. Discuss the ethical implications in the vulnerabilities of wireless network technologies. 2. Design a secure enterprise wireless network using the network simulator of your choice. 3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following CIAAA elements: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. 5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other’s terminals on the same network 6. Demonstration of your network prototype in Week 11 lab. The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group should be from the same lab. BN303 Wireless Networks and Security Page # 3 of 4 Updated by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha August, 2019 Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 5 Report Layout Report layout, style and language 5 Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network 10 Design secure enterprise wireless network Design a secure enterprise wireless network, employing packet tracer or GNS3. 15 Analyse secure enterprise wireless network Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 15 Implement secure enterprise wireless network Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. 20 Testing Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de- association, and pinging each other’s terminals on the same network 5 Demonstration Demonstration in Week 11 during the Lab. 15 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 100 Marking Rubric for Assignment #2: Total Marks 100 Grade Mark HD 80-100 DI 70-79 CR 60-69 P 50-59 Fail<50 excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. bn303 wireless networks and security page # 4 of 4 updated by: a/prof tony jan moderated by: dr sanjeeb shrestha august, 2019 explore ethical implications /10 finding is clearly linked and well justified finding is clearly linked and justified finding is linked and convincing finding is not linked and unjustified finding is not available design secure enterprise wireless network /15 demonstrated excellent ability to think critically and present an exceptional design considering all the requirements demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s demonstrate d good ability to think critically and present a good design considering all the requirements. demonstrated ability to think critically and present a design did not demonstrate ability to think critically and present a design. analyse secure enterprise wireless network /15 excellent analysis included wpa2 and radius and covered all aspects. good analysis included wpa2 and radius and covered some aspects. good analysis included wpa2 and radius some analysis provided and included wpa2 and radius lacking analysis of wpa2 and radius. implement secure enterprise wireless network /20 all elements are present and very well integrated. components present with good cohesive components present and mostly well integrated most components present proposal lacks structure. testing /5 testing was successful between client and ap. all required snapshots attached testing was successful between client and ap. some snapshots attached testing was successful between client and ap. few required snapshots attached testing was partially successful between client and ap. all required snapshots attached testing was not successful. demonstration /15 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction demonstration is confused and disjointed conclusion /5 logic is clear and easy excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" report="" layout="" 5="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used.="" poor="" report="" layout,="" style="" and="" language="" used.="" bn303="" wireless="" networks="" and="" security="" page="" #="" 4="" of="" 4="" updated="" by:="" a/prof="" tony="" jan="" moderated="" by:="" dr="" sanjeeb="" shrestha="" august,="" 2019="" explore="" ethical="" implications="" 10="" finding="" is="" clearly="" linked="" and="" well="" justified="" finding="" is="" clearly="" linked="" and="" justified="" finding="" is="" linked="" and="" convincing="" finding="" is="" not="" linked="" and="" unjustified="" finding="" is="" not="" available="" design="" secure="" enterprise="" wireless="" network="" 15="" demonstrated="" excellent="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirements="" demonstrat="" ed="" good="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirement="" s="" demonstrate="" d="" good="" ability="" to="" think="" critically="" and="" present="" a="" good="" design="" considering="" all="" the="" requirements.="" demonstrated="" ability="" to="" think="" critically="" and="" present="" a="" design="" did="" not="" demonstrate="" ability="" to="" think="" critically="" and="" present="" a="" design.="" analyse="" secure="" enterprise="" wireless="" network="" 15="" excellent="" analysis="" included="" wpa2="" and="" radius="" and="" covered="" all="" aspects.="" good="" analysis="" included="" wpa2="" and="" radius="" and="" covered="" some="" aspects.="" good="" analysis="" included="" wpa2="" and="" radius="" some="" analysis="" provided="" and="" included="" wpa2="" and="" radius="" lacking="" analysis="" of="" wpa2="" and="" radius.="" implement="" secure="" enterprise="" wireless="" network="" 20="" all="" elements="" are="" present="" and="" very="" well="" integrated.="" components="" present="" with="" good="" cohesive="" components="" present="" and="" mostly="" well="" integrated="" most="" components="" present="" proposal="" lacks="" structure.="" testing="" 5="" testing="" was="" successful="" between="" client="" and="" ap.="" all="" required="" snapshots="" attached="" testing="" was="" successful="" between="" client="" and="" ap.="" some="" snapshots="" attached="" testing="" was="" successful="" between="" client="" and="" ap.="" few="" required="" snapshots="" attached="" testing="" was="" partially="" successful="" between="" client="" and="" ap.="" all="" required="" snapshots="" attached="" testing="" was="" not="" successful.="" demonstration="" 15="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" demonstration="" is="" confused="" and="" disjointed="" conclusion="" 5="" logic="" is="" clear="" and="">50 excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. bn303 wireless networks and security page # 4 of 4 updated by: a/prof tony jan moderated by: dr sanjeeb shrestha august, 2019 explore ethical implications /10 finding is clearly linked and well justified finding is clearly linked and justified finding is linked and convincing finding is not linked and unjustified finding is not available design secure enterprise wireless network /15 demonstrated excellent ability to think critically and present an exceptional design considering all the requirements demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s demonstrate d good ability to think critically and present a good design considering all the requirements. demonstrated ability to think critically and present a design did not demonstrate ability to think critically and present a design. analyse secure enterprise wireless network /15 excellent analysis included wpa2 and radius and covered all aspects. good analysis included wpa2 and radius and covered some aspects. good analysis included wpa2 and radius some analysis provided and included wpa2 and radius lacking analysis of wpa2 and radius. implement secure enterprise wireless network /20 all elements are present and very well integrated. components present with good cohesive components present and mostly well integrated most components present proposal lacks structure. testing /5 testing was successful between client and ap. all required snapshots attached testing was successful between client and ap. some snapshots attached testing was successful between client and ap. few required snapshots attached testing was partially successful between client and ap. all required snapshots attached testing was not successful. demonstration /15 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction demonstration is confused and disjointed conclusion /5 logic is clear and easy>