Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: XXXXXXXXXXwords (Excluding references) Submission method options: Alternative...

1 answer below »
strictly no plagiarism.wireless network security is my topic.i hav attached abstract.





Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return Date: 09-Oct-2018 Length: 1500-2000 words (Excluding references) Submission method options: Alternative submission method Task back to top In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects: · Overview of the topic · Relevant technologies and applications of those technologies · Highlighting the challenges/problems in your chosen research area · Identification of any gaps in the literature by: · discussing areas/issues that you believe have been addressed in the current literature; · highlighting areas/issues that have not been addressed or adequately addressed; and · discussing your view(s) on the issue(s) that you see as being critical. · Summarize the future research directions based on the identified research gaps To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 7 research articles. Students are encouraged to access such research articles from well-known and reputed research portals such as IEEE, ACM, Springer, Science Direct etc. Please note Wikipedia and general blogs will not be considered as acceptable citations. Your report should include the following sections. A template will also be made available in the Resources section of your subject Interact2 site. Abstract (As submitted for Assessment 3) Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important. Keywords Three to seven keywords representing the main content of the report. Introduction The Introduction section should explain the background to the report, its aims, a summary of the relevant existing literature and the issue/issues under discussion. Main text This should contain the body of the report and should be broken into appropriate subsections with short, informative headings and sub-headings. Conclusions This should clearly mention the main conclusions and include an explanation of their relevance or importance to the field. References List the references used in your research. Rationale back to top This assessment task will assess the following learning outcome/s: · be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. · be able to explain the fundamental concepts of cryptographic algorithms. · be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. · be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system. · be able to investigate and justify the use of the access control mechanisms and user authentication processes. · be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality. This assessment continues from/links back to Assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security. The aim of this task is to help students : · to demonstrate the ability to integrate and apply information from various topics; · to build an understanding and perspective of current and emerging topics in Information Security; · to help the students to formulate their research project in a step by step manner; and · to build generic skills including, critical thinking, analysis, problem-solving in the context of Information Security Marking criteria and standards back to top Assessment criteria Assessable Components HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 Abstract (5 Marks) A very concise abstract where the aim of the study is perfectly articulated, the central question is precisely formulated, A concise abstract where the aim of the study is appropriately articulated, the research question is formulated. A concise abstract where the aim of the study is relatively articulated, the research question is adequately formulated. A concise abstract where the aim of the study is articulated, the research question is vaguely formulated. Incomplete abstract with no research question identified. Introduction and background (3 Marks) A comprehensive discussion in relation to the research background as well as the aim/objectives of research is included.  A highly detailed discussion in relation to the significance as well as the aim/objectives of research is included. A thorough discussion in relation to the significance as well as the aim/objectives of research is included. An adequate discussion in relation to the significance as well as the aim/objectives of research is included An incomplete or irrelevant discussion is included. Selects literature (at leastseven references) that reflects recent developments in the area and emphasizes primary literature (i.e. journal articles containing original research) (2 Marks) Literature selected magnificently reflects recent developments in the area and completely emphasizes primary literature (i.e. journal articles containing original research).    High-quality references. Literature selected clearly reflects recent developments in the area and largely emphasizes primary literature (i.e. journal articles containing original research).    High-quality references.  Literature selected relatively reflects recent developments in the area and generally emphasizes primary literature (i.e. journal articles containing original research).    Good quality references. Literature selected relatively reflects recent developments in the area but hardly emphasizes primary literature (i.e. journal articles containing original research).    The mix of good and poor quality references. Literature selected does not reflect recent developments in the area and does not emphasize primary literature (i.e. journal articles containing original research).    Poor quality references. Identifies gaps in the literature. (4 Marks) Comprehensive knowledge of the topic and in-depth explanation of the issues that are not addressed. Reasonable knowledge of the topic and a comprehensive explanation of the issues that are not addressed. Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that are not addressed. Limited knowledge of the of the topic and a basic explanation of the issues that are not addressed. Fails to satisfy minimum requirements of explaining the issues. Comments on future research directions based on the identified gaps i.e what other research questions arise from the literature. (4 Marks) The proposed future research direction is well formulated and ably answers all the identified gaps. The proposed future direction is adequately formulated and sufficiently answers most of the identified gaps. The proposed future research direction is adequately formulated and answers some of the identified gaps. The proposed future research direction is either not adequately formulated or does not sufficiently answer the identified gaps. The proposed future research direction is  not adequately formulated and does not sufficiently answer the identified gaps Written clearly (with content well organized) (1 Marks) Highly developed skills in expression & presentation of ideas.  Fluent writing style appropriate to assessment task/document type.  Grammar & spelling accurate. Formal English is used throughout. Well developed skills in expression & presentation of ideas.  Fluent writing style appropriate to assessment task/document type.  Grammar & spelling accurate. Mostly uses formal English. Good skills in expression & clear presentation of ideas.  Mostly fluent writing style appropriate to assessment task/document type.  Grammar & spelling contains a few minor errors. More or less uses formal English. Some skills in expression & presentation of ideas.  Meaning apparent, but writing style not always fluent or well organized.  Grammar & spelling contains several careless errors. Hardly uses formal English Rudimentary skills in expression & presentation of ideas.  Not all material is relevant &/or is presented in a disorganised manner.  Meaning apparent, but writing style not fluent or well organized.  Grammar & spelling contains many errors. Does not use formal English. Provides references using APA referencing system including in-text citations. (1 Marks) Faultless referencing, including reference list and in-text citations. Very good referencing, including reference list and in-text citations. Good referencing, including reference list and in-text citations. Evidence of rudimentary referencing skills. Sub-standard referencing. Presentation back to top Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or not referenced). APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link:  http://student.csu.edu.au/study/referencing-at-csu Requirements back to top Please note: Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting. All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labeled and referenced.  A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number) Abstract : Wireless Networks are prioritized day to day in people’s lives through the advanced usage of electronic devices and systems. Traditionally, conventional networks similar to LAN Network, had provided limited access to the users and had issues with cables, like manually being connected to a computer from dial ups or getting into cross-connections which leads to loss of data, information leakage and/or data being misused. On the other hand, wireless networks through WLAN are easy to deploy and are widely used in different areas by public and private users. Even though wireless networks follow strong cryptography, due to their provision of ease of access, they have security and privacy issues. This ease of access gives rise to security threats by unethical miscreants like hackers, who steal sensitive information. This paper mainly focuses on perimeters of maintaining confidentiality, integrity and authentication to avoid the security threats and risks by concentrating on the basics of security protocol layers, following algorithms and reviewing techniques to minimize the wireless network security issues. Thank you Sir.
Answered Same DaySep 07, 2020Swinburne University of Technology

Answer To: Assessment item 5 back to top Research project (Report) Value: 20% Due Date: 14-Sep-2018 Return...

Ankit answered on Sep 12 2020
130 Votes
Student_ID: 11665270
                Student_Name: Katari Bala Venkata Surya Tej
                Title: Wireless network security
Abstract
Now day’s technology is advancing continuously with increasing cost/performance which is beneficial for everyone. Wireless network is in great demand in public and office. Wireless network replaced the traditional networks which is similar to
LAN network that give restricted or little access to their users. The users of traditional networks had faced various issues while connecting to network manually and sometimes user lost their data due to poor connectivity. Wireless networks through WLAN are very simple to install and most popular now days in public places, offices and for home user. The wireless network use strong cryptography technique due to their provision of ease of access but there are various security and privacy issues. There are different security threats due to unauthorized access to WLAN network who hack the private data. The main purpose of this document is to protect the network from security threats by focusing on different wireless network techniques.
Keywords
Wireless network security, WLAN, Network threat Security threat, Security
Introduction
The aim of this research is to focus on different wireless security technologies and applications of these technologies. The document states challenges in wireless network security. The document identifies any gap in research such as areas or issues that need to addressed and also discuss writers view on this issues or areas. The document also focuses on future research directions based on identified research gaps.
Today wireless network technology is used everywhere in offices, homes and public places. In this we discuss some of the fundamental technologies of wireless network system.
Wireless network security technologies
a) WLAN
WLAN stands for wireless local area network. This is network framework that needs upper frequency radio signals to communicate or transferred data between different networks.
b) WAP
WAP is hardware or configured tool that permits various wireless communication devices such as PDA and mobile computers to attach to a wireless access point. [Mitchell 2018]
c) Service Set identifier (SSID)
SSID consists of grouping of characters which distinctly titles a WLAN (wireless local area network). “A SSID is here and there alluded to as a system title. This title helps stations to associate with the coveted system when various autonomous frameworks work in the same physical region.”
There is different technology used for wireless network such as open system authentication and shared key authentication.
OSA is techniques through which devices can access to a wireless network that make use of WEP (wired equivalent Privacy protocol). It is default authentication protocol which has 802.11 standards.
Shared key authentication is a verification method through which devices uses WEP (wired equivalent Privacy protocol) to get access to a wireless network. The method is standard challenge and response procedure that utilized WEP and use shared secret key to allow authentication. [CWNP 2018]
d) Adhoc Mode
Adhoc mode is type of network topologies which has 802.11 standards. Ad-hoc mode states a type of mode that connects different remote gadgets to each other without utilization of a middle system such as router which carries the flow of data. The device or node connected to an adhoc network moves data to next nodes in adhoc network. The cost of installing Adhoc mode WLANs is very less because no APs are required for data transfer. This technology is not so...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here