Prepared by: Dr Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 Assessment Details and Submission Guidelines Trimester T1 2021 Unit Code BN303 Unit Title Wireless Networks and Security...

1 answer below »
BN303 assignment 2


Prepared by: Dr Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 Assessment Details and Submission Guidelines Trimester T1 2021 Unit Code BN303 Unit Title Wireless Networks and Security Assessment Author Associate Professor Tony Jan Assessment Type Group Submission Assessment Title Secured design of wireless LAN Unit Learning Outcomes covered in this assessment Students will be able to complete the following ULOs: a. Explain wireless communication protocols; b. Utilise standards-based technologies used in various networks; d. Apply wireless network security techniques in the context of ethical implications; e. Design and implement secure enterprise wireless networks. Weight 30% of total assessment Total Marks 50 Word limit Minimum 1500 - Maximum 2000 Due Date 03/June/2021 11:59 PM Submission Guidelines ● All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ● The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ● Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct ● Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and- guidelines/AcademicintegrityPolicyAndProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 Assignment Description: Design and implementation of wireless LAN for a small company with necessary tools and techniques to evaluate wireless network security. You are a network security engineer at the UniQoo Design Pty Ltd in Brisbane, Australia. The company houses more than 500 freelancer designers who often travel to the premise to hold a meeting with business clients. The designers need to have their creative products available on the Cloud as well as on their personal laptops so that they can demonstrate their works to their clients. Recent cyberattacks on Australian companies have heightened the concern for UniQoo Design, as a number of their competitions reported their ill fate of losing valuable creative assets due to the cybersecurity attacks. Your task, as a network security engineer, is to provide convenient Internet access for the visitors/business partners while maintaining a high level of security for internal staff, including designers. As the number of internal team is large, a remote authentication server is pivotal to successful security operations. In this assignment, your project is to install WLAN for the CBD premise for UniQoo Design. In this project, you will analyse the threat landscape to check the potential attacks, and design and implement appropriate wireless network architecture for a secure and convenient business computing environment. The requirements include; internal data network to provide wired access to staff members or administrative officers for faster and secure connection to their design data, and free Internet access for visitors and business clients who are visiting the premise. Your objective is to fulfil accessibility, connectivity and availability of wireless network with the high level of security. You need to investigate a set of tools including WAP or WAP2 to provide high level of wireless security. The details should include technologies in IEEE802.11a/b/g/n and IEEE802.11x authentication in wireless LANs. Requirements For this project, you will design the network as specified in the above scenario from scratch. You have to submit a group report and specify each individual group member’s contribution on the front page. You should also address the following tasks in your report: ● Design of a simple mock business computing network schematics (using Packet Tracer or other simulator) ● Discussion of threats in business computing environment (what are the potential attacks to your business) ● Wireless network security design using WPA or WPA2 technique with the support of 802.1X Followed by: ● Evidence of deployment of wireless network and its security solution using WAP or WAP2 (on Packet Tracer or other simulation platforms) ● Segregation of free Internet access network from Internal data network by various levels of security grouping o Admin access Prepared by: Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 o Designer access o Visitor access Or any other groups you consider appropriate (e.g. marketing team)  Evidence your system has been secured in confidentiality, integrity and availability. All group members: Write a report that includes the following sections: abstract, introduction, proposed design, evidence implementation (on simulator), followed by conclusion and reflection in terms of data ethics. Marking criteria: Marks are allocated as indicated on each question, taking the following aspects into account: Note: The marking criteria varies for each assignment Section to be included in the report Description of the section Marks Abstract Aims and objectives of this report 2 Introduction History of WLAN, network components, and outline of report. 10 Threat Analyse Report on threat landscapes for the case study network 10 Design Create a design of the proposed solution with suitable diagram or figures 10 Implementation Provide evidence of your implementation on a simulated environment 10 Evaluation/justification Evaluate your proposed solutions and write justification of your evaluation 5 Conclusion and reflection Briefly summarized the outcomes of the work using 2/3 sentences with reflection on ethical concerns in wireless data network 2 Reference style Follow IEEE reference style 1 Total 50 Example Marking Rubric for Assignment #: Total Marks 50 Note: The marking rubrics varies for each assignment Grade Mark HD 40-50 DI 35-44 CR 30-34 P 25-29 Fail<25 excellent very good good satisfactory unsatisfactory abstract /2 clearly written the goal of the work soundly written the goal of the work usually written the goals briefly presented the goals did not mention the goal introduction /10 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. analyse /10 logic is clear with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is not clearly stated prepared by: tony jan moderated by: dr. sanjeeb shrestha march 2021 design /10 all elements are present with required diagram. components present cohesively components present and mostly well integrated most components present poor proposed design. implement /10 exceptional implementation good implementa tion useful implementatio n acceptable implementation poor or no implementatio n evaluate/justifi cation /5 excellent comparison is made throughout this section. outstanding execution is made evaluate very good way good effort to evaluate but limited comparison little bit effort for comparison through web search. poor attempt to justify conclusion /2 summarized the concept logically with strong arguments consistency logical and convincing good presentation of the summary moderate summary of the work. failed to summarize the work. reference style /1 excellent reference style according to ieee and most are relevant and recent good reference according to ieee but some are old adequate reference most are old mix of reference style and old error in the reference style according of iee and majority are irrelevant. excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" abstract="" 2="" clearly="" written="" the="" goal="" of="" the="" work="" soundly="" written="" the="" goal="" of="" the="" work="" usually="" written="" the="" goals="" briefly="" presented="" the="" goals="" did="" not="" mention="" the="" goal="" introduction="" 10="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" analyse="" 10="" logic="" is="" clear="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" not="" clearly="" stated="" prepared="" by:="" tony="" jan="" moderated="" by:="" dr.="" sanjeeb="" shrestha="" march="" 2021="" design="" 10="" all="" elements="" are="" present="" with="" required="" diagram.="" components="" present="" cohesively="" components="" present="" and="" mostly="" well="" integrated="" most="" components="" present="" poor="" proposed="" design.="" implement="" 10="" exceptional="" implementation="" good="" implementa="" tion="" useful="" implementatio="" n="" acceptable="" implementation="" poor="" or="" no="" implementatio="" n="" evaluate/justifi="" cation="" 5="" excellent="" comparison="" is="" made="" throughout="" this="" section.="" outstanding="" execution="" is="" made="" evaluate="" very="" good="" way="" good="" effort="" to="" evaluate="" but="" limited="" comparison="" little="" bit="" effort="" for="" comparison="" through="" web="" search.="" poor="" attempt="" to="" justify="" conclusion="" 2="" summarized="" the="" concept="" logically="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" good="" presentation="" of="" the="" summary="" moderate="" summary="" of="" the="" work.="" failed="" to="" summarize="" the="" work.="" reference="" style="" 1="" excellent="" reference="" style="" according="" to="" ieee="" and="" most="" are="" relevant="" and="" recent="" good="" reference="" according="" to="" ieee="" but="" some="" are="" old="" adequate="" reference="" most="" are="" old="" mix="" of="" reference="" style="" and="" old="" error="" in="" the="" reference="" style="" according="" of="" iee="" and="" majority="" are="">
Answered 7 days AfterAug 30, 2021BN303

Answer To: Prepared by: Dr Tony Jan Moderated by: Dr. Sanjeeb Shrestha March 2021 Assessment Details and...

Ali Asgar answered on Sep 06 2021
140 Votes
Contents
Abstract    2
Introduction    2
History of WLAN    2
Network Components    2
Outline of report    3
Network Analyze    3
Sniffing    3
Man-in-the-middle-attack    3
Phishing    3
Design    4
Implementation    4
Evaluation    9
Conclusion    9
References    10
Abstract
Design and implementation of secure Wireless LAN network for visiting Business Partn
ers and other guests. The report also highlights the various Cyber threats currently popular among attackers in the region and ways to mitigate and prevent those threats in the new WLAN implementation.
Introduction
History of WLAN
A Wireless Lan is a computer network connected 2 or more computers together without the use of wires. It gives the users the ability to move within a limited area and stay connected to the network. Using a gateway, WLAN can also provide connectivity to the internet.
Wireless LAN or Wifi, as is generally known, was first created by University of Hawaii as a means to communicate between various islands in Hawaii. It was later adopted by IEEE as 802.11 standard in 1997.
In 1999 Wifi was introduced to the public use as 802.11a and 802.11b standards that were very slow, 54 Mbps and 11 Mbps respectively.. But since Wifi was an optional standard in most systems and there were no smartphones then, this standard was enough.
By 2003, these speeds were not acceptable and thus came 802.11g, that provided speeds upto 54 Mbps and later in 2007 came the 802.11n standard that provided speeds upto 450 Mbps.
With the advent of 802.11ac, Wifi has reached the speeds in gigabit.
Network Components
Access Points: These are the base stations for the wireless networks. They emit and receive radio waves that are used by Wireless-enabled devices to communicate with. The access points communicate to other access points using the physical layer, then it is called Basic Service Set (BSS).
Clients: Any machine that connects to a Wireless LAN but do not itself act as an Access Point, are known as wireless client. Wireless clients can be both movable and immovable. In adhoc Networks, there are no access points and thus do not connect to any basic service set.
Repeater: A repeater is a Wifi range extender, that do not create a new Wifi network, but simply extends the range of the existing Wifi coverage. This is generally done by putting the repeater in one Wifi Channel for receiving and making it transmit its own signals in a distinct separated Wifi-Channel to avoid interference.
Channel: Channels in Wifi are distinct bands of frequescy in the Wifi range that is used by the transmitting wifi device to send its signals in. There are separate channels in wifi to prevent frequency interference between wireless signals from various wifi devices placed near each other.
Outline of report
Uniqoo Designs Pvt Limited has about 500 designers working both on-premise and away intermittently. The company needs a secure way to allow its designers to access their designs on the cloud from both locations. Also avoiding any unauthorised access to those files from anywhere else. Uniqoo requires to implement security measures such that no unauthorized person can access the WiFi network as there has been cases of security breaches in the industry earlier with competitors and other Australian companies.
We have been tasked with identifying the various cyber security threats that can be...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here