B. Hands-on Project inSSIDeris a popular wireless network scanner. Download the free version of this application fromhttps://www.metageek.com/downloads/inssider-win/. Follow the instructions to use it...


B. Hands-on Project


inSSIDeris a popular wireless network scanner. Download the free version of this application fromhttps://www.metageek.com/downloads/inssider-win/. Follow the instructions to use it as explained in MetaGeek’s website. Run the application to scan Wi-Fi network.


Now, write a report including the following information.


1. List every piece of information that the inSSIDer scanner normally produces [For example, the MAC (physical) address of the network, its SSID etc.]. Briefly explain what each one of them mean.


2. Now, state and explain the information that you obtained from your ‘run’ of the application. For every piece of information, include a screenshot from your ‘run’. What are your most important observations? Why do you consider them to be important?


3. Explain in detail, how a network administrator could use the information generated by the inSSIDer Wi-Fi network analyser.

4. Do you think, attackers could also benefit from such Wi-Fi network analysers? Justify your response in detail.


5. Finally, search the internet for five (5) other wireless network analysers. Based on the information available about these products, which one would you recommend for a small business and why? Make assumptions about the type, settings, requirements of the business.



Note:

There is not rigid word limit for this report. However, around 1000 words will be appropriate.

RATIONALE

back to top

This assessment task will assess the following learning outcome/s:



  • be able to explain fundamental network security concepts.

  • be able to analyse the security threats to a network.


MARKING CRITERIA AND STANDARDS

back to top



























































































Criteria



HD
100% - 85%



DI
84% - 75%



CR
74% - 65%



PS
64% - 50%



FL
49% - 0



A. Short Report


(Total 7 marks)


















Able to apply theories and concepts to analyse IT security implications


(3 marks)



Demonstrates comprehensive understanding of the relevant IT security perspectives. Correct application of the theories and concepts through in-depth discussion, providing highly relevant real-world examples.



Demonstrated clear understanding of the relevant IT security perspectives. Correct application of the theories and mostly comprehensive analysis with suitable examples.



Correct application of the IT Security perspective and mostly comprehensive analysis with suitable examples.



Mostly correct application of the IT security perspective; includes reasonable level of analysis. Some omission.



Major omissions in the application of the IT security concepts and the analysis.



Demonstrates application of research skills through the critical analysis and evaluation of relevant literature


(3 marks)



Literature and sources presented is evidence of high-level application of research skills; with comprehensive and critical appraisal of the literature and discussion of theory supported by sources in addition to those recommended in the course content. Referencing style has no mistakes.



Clear evidence of research relevant to the subject; able to critically appraise the literature and theory gained from a variety of sources. Referencing style correctly used.



Clear evidence of research relevant to the subject; uses indicative texts identified. Referencing style correctly used. Minor omissions only.



Some evidence of research. Some mistake in referencing style.



Either no evidence of literature being consulted or cited references irrelevant to the assignment set.



Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements.


(1 mark)



The tone and style are exemplary, and is appropriate to the content of the scholarly review.



Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling.



Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only.



Writing style
not always
fluent or well
organised and
grammar and
spelling contain
errors.



Writing style
not fluent or
well organised
and many
grammatical and
spelling
mistakes.



B. Hands-on Project


(Total 13 marks)


















Successful completion of the hands-on task.


(2 marks)



The task was appropriately completed, as is evident from the screenshots.



The task was appropriately completed, as is evident from the screenshots. Minor omissions only.



The task was mostly appropriately completed, as is evident from the screenshots. Some omissions.



The task was rightly done. Some evidences have been provided.



Little or no evidence of the task being appropriately done.



Able to apply theories and concepts to analyse computer network scenario.


(8 marks)



Demonstrated comprehensive understanding of the relevant networking perspectives. Correct application of the theories and concepts through in-depth discussion.



Demonstrated clear understanding of the relevant networking perspectives. Correct application of the theories and mostly comprehensive analysis.



Correct application of the networking perspective and mostly comprehensive analysis.



Mostly correct application of the networking perspective; includes reasonable level of analysis. Some omissions.



Major omissions in the application of the networking concepts and the analysis.



Demonstrates application of research skills.


(2 marks)



Evidence of high-level application of research skills.



Clear evidence of research relevant to the subject.



Clear evidence of research relevant to the subject. Minor omissions only.



Some evidence of research.



Either no evidence of literature being consulted or cited references irrelevant to the assignment.



Written communication is scholarly in tone and purpose, and conforms to scholarly writing requirements.


(1 mark)



The tone and style is exemplary, and is appropriate to the content of the scholarly review.



Mostly Fluent writing style appropriate for the assignment with accurate grammar and spelling.



Mostly fluent writing style appropriate for the assignment with mostly accurate grammar and spelling. Minor omissions only.



Writing style
not always
fluent or well
organised and
grammar and
spelling contain
errors.



Writing style
not fluent or
well organised
and many
grammatical and
spelling
mistake.





REQUIREMENTS

back to topFor this assessment you are required to use APA referencing to acknowledge the sources that you have used in preparing your assessment. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. In addition, a very useful tool for you to use that demonstrates how to correctly use in text referencing and the correct way to cite the reference in your reference list can be found athttps://apps.csu.edu.au/reftool/apa-7



You must submitone single WORD or PDF filefor this assessment item.


Assessment tasks that are not completed through the Subject site need to be submitted electronically via Turnitin site by the due date. Turnitin password details for this subject will be given by your lecturer.


Unless advised otherwise, all Turnitin submissions are due by midnight (AEST) according to the date mentioned in the subject outline. Please note that the time and the date of your Turnitin submission will be used to determine your official submission time. Assignment(s) submitted in the RESPECTIVE FINAL FOLDER will only be considered for marking.


All textual elements within an assessment must be submitted in a format that is readable by Turnitin. Specific exceptions, where an assessment requires the insertion of image based evidence of workings will be outlined in the context of the assessment. Students that deliberately attempt to insert content of assessments in a format that is not readable by Turnitin may be subject to Academic misconduct investigations.



Additional Submission Information:


It is recommended thatyour name,student IDandpage numberare included in the header or footer of every page of any assignment. You are also required to rename your assignment file before you submit via Turnitin as per below protocol:


SUBJECT CODE, SMI/SI, SURNAME, STUDENT ID, ASSESSMENT NUMBER

Apr 20, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here