Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN603 Unit Title Wireless...

1 answer below »
There should be no plagiarism nd it should make according to the marking certeria



Prepared by: Dr Javed Ali Baloch Moderated by: A/Prof Savitri Bevinakoppa April, 2018 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Assignment 2: Group Assignment Assessment Title Design and implementation of secure enterprise wireless network Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes: d. Apply and evaluate wireless network security techniques in consideration of ethical implications; e. Design and implement secure enterprise wireless networks. Weight 20% Total Marks 100 Word limit 2000 - 2500 Due Date 29/05/2018 11:55PM Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure MN603 Wireless Networks and Security Assignment 2 Page # 2 of 4 Prepared by: Dr Javed Ali Baloch Moderated by: A/Prof Savitri Bevinakoppa April, 2018 Assignment Description Enterprise wireless LAN deployments have skyrocketed in recent years, evolving from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard – industry advances in technology and vendor innovation makes this easier than ever. Default settings for most access points do not include any form of security being enabled. This is the most common reason that wireless LANs are hacked or used by unauthorized personnel. When deployed, immediately turn a method of over-the-air security on. For enterprises, it is recommended that the most secure over-the-air encryption and authentication method be used – either IEEE 802.11i or a VPN. IEEE 802.11i, also known as WPA2 when the access point is certified by the Wi-Fi Alliance, uses IEEE 802.1x for mutual authentication between the client and the network and AES for data encryption. Its predecessor was WPA, an interim form of security certified by the Wi-Fi Alliance while the 802.11i standard was still being ratified. WPA also uses 802.1x for authentication, but TKIP for encryption. While AES is considered the stronger encryption method, it is worth noting that WPA has never been cracked. 802.11i, WPA2 and WPA require the use of a RADIUS server to provide the unique, rotating encryption keys to each client. This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle. 1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network. 2. Design a secure enterprise wireless network, employing Boson Netsim. 3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects: a. Authorization b. Authentication c. Integrity d. Network eavesdropping prevention 4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. 5. Demonstration in Week 11 during the Lab. The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group should be from the same lab. MN603 Wireless Networks and Security Assignment 2 Page # 3 of 4 Prepared by: Dr Javed Ali Baloch Moderated by: A/Prof Savitri Bevinakoppa April, 2018 Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 5 Report Layout Report layout, style and language 5 Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network 10 Design secure enterprise wireless network Design a secure enterprise wireless network, employing Boson Netsim. 20 Analyse secure enterprise wireless network Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects: a. Authorization b. Authentication c. Integrity d. Network eavesdropping prevention 20 Implement secure enterprise wireless network Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server. 20 Demonstration Demonstration in Week 11 during the Lab. 10 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 100 Marking Rubric for Assignment #1: Total Marks 10 Grade Mark HD 80-100 DI 70-79 CR 60-69 P 50-59 Fail<50 excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. explore ethical implications /10 finding is clearly linked and well justified finding is clearly linked and justified finding is linked and convincing finding is not linked and unjustified finding is not available design secure enterprise wireless network demonstrated excellent ability to think critically and present an demonstrat ed good ability to think demonstrate d good ability to think critically and present a demonstrated ability to think critically and present a design did not demonstrate ability to think critically and mn603 wireless networks and security assignment 2 page # 4 of 4 prepared by: dr javed ali baloch moderated by: a/prof savitri bevinakoppa april, 2018 /20 exceptional design considering all the requirements critically and present an exceptional design considering all the requirement s good design considering all the requirements. present a design. analyse secure enterprise wireless network /20 excellent analysis included wpa2 and radius and covered all aspects. good analysis included wpa2 and radius and covered some aspects. good analysis included wpa2 and radius some analysis provided and included wpa2 and radius lacking analysis of wpa2 and radius. implement secure enterprise wireless network /20 all elements are present and very well integrated. components present with good cohesive components present and mostly well integrated most components present proposal lacks structure. demonstration /10 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction demonstration is confused and disjointed conclusion /5 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is confused and disjointed reference style /5 clear styles with excellent source of references. clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" report="" layout="" 5="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used.="" poor="" report="" layout,="" style="" and="" language="" used.="" explore="" ethical="" implications="" 10="" finding="" is="" clearly="" linked="" and="" well="" justified="" finding="" is="" clearly="" linked="" and="" justified="" finding="" is="" linked="" and="" convincing="" finding="" is="" not="" linked="" and="" unjustified="" finding="" is="" not="" available="" design="" secure="" enterprise="" wireless="" network="" demonstrated="" excellent="" ability="" to="" think="" critically="" and="" present="" an="" demonstrat="" ed="" good="" ability="" to="" think="" demonstrate="" d="" good="" ability="" to="" think="" critically="" and="" present="" a="" demonstrated="" ability="" to="" think="" critically="" and="" present="" a="" design="" did="" not="" demonstrate="" ability="" to="" think="" critically="" and="" mn603="" wireless="" networks="" and="" security="" assignment="" 2="" page="" #="" 4="" of="" 4="" prepared="" by:="" dr="" javed="" ali="" baloch="" moderated="" by:="" a/prof="" savitri="" bevinakoppa="" april,="" 2018="" 20="" exceptional="" design="" considering="" all="" the="" requirements="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirement="" s="" good="" design="" considering="" all="" the="" requirements.="" present="" a="" design.="" analyse="" secure="" enterprise="" wireless="" network="" 20="" excellent="" analysis="" included="" wpa2="" and="" radius="" and="" covered="" all="" aspects.="" good="" analysis="" included="" wpa2="" and="" radius="" and="" covered="" some="" aspects.="" good="" analysis="" included="" wpa2="" and="" radius="" some="" analysis="" provided="" and="" included="" wpa2="" and="" radius="" lacking="" analysis="" of="" wpa2="" and="" radius.="" implement="" secure="" enterprise="" wireless="" network="" 20="" all="" elements="" are="" present="" and="" very="" well="" integrated.="" components="" present="" with="" good="" cohesive="" components="" present="" and="" mostly="" well="" integrated="" most="" components="" present="" proposal="" lacks="" structure.="" demonstration="" 10="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" demonstration="" is="" confused="" and="" disjointed="" conclusion="" 5="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" reference="" style="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing="" style="" generally="" good="" referencing="" style="" sometimes="" clear="" referencing="" style="" lacks="" consistency="" with="" many="">
Answered Same DayMay 08, 2020MN603

Answer To: Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018...

Amit answered on May 23 2020
149 Votes
Title of the assessment:
Names of the student:
Student ID:
Session:
Department Name:
Semester Name:
Academic Year:
Date:
Table of Contents
1.    Introduction    3
2.    Ethical implications of secured wireless network for any organization    3
3.    Wireless network development with Boson Netsim    4
4.    Security analysis and implementation of wireless network through RADIUS server and WPA2    13
5.    Conclusion    
14
6.    References:    15
1. Introduction
The fast acceptance of wireless networks in different modern enterprises involves the network security as the major dimension against the vulnerabilities caused by different intruders and hackers. The use of handhelds increases the development of wireless networks for different applications and their required data. As the extension of some wired network, wireless network provides improvements and better response to its customers from bottom line. The security of wireless network is considered by deployed security policy, deployed security to network, security to Ethernet, security from outside threats, and educating users with respect to wireless policy. So, development and maintaining the security of wireless network is most critical task for a network administrator in modern enterprises [Wright, 2015].
2. Ethical implications of secured wireless network for any organization
The development of proper security related to wireless network is considered as the most important aspect in modern enterprises. The implementation of wireless network in any enterprise has certain possible legal as well ethical implications for network administrator and end user. For developing the wireless network for any enterprise, 802.11x standard developed by IEEE is being mostly used. In these networks, client machines use the AP (Access points) to make their connectivity with developed network. The AP of any wireless network provides central services to end users. The BSS (Basic Service Set) is being used by these AP’s for communication services. The client machines can over pass these BSS, and can use IBSS for making independent and peer based direct connections. This is not ethical that client overpass the developed AP of any wireless network.
Thus, the development of wireless network has associated ethical security implications which require considerations for end users. The points showing such ethical implications of secured wireless network for any enterprise are listed below:
1. The maintenance of confidentiality is the main ethical implication in wireless network. The end user of wireless network is responsible to maintain the confidentiality of network credentials [Rodríguez, 2015].
2. The following of developed WEP (Wireless Equipment Privacy) by end user is also an ethical implication towards network.
3. There are nearby 16 million different initialization vectors are being used in 32 bit IPv4. In any wireless network, so many different data packets are travelling at the same time. Any hacker can make a watch on repeated data packets based on the vector length. So, it is ethical duty of end user, not to make transfer of data packets of same size continuously on used wireless network.
4. The encryption of RC4 is mostly used in development of wireless networks. The RC4 is a mathematical algorithm, so, hackers can use this RC4 for finding the WEP key. So, it is ethical duty of network administrator to make regular updating and required changes in developed WEP key.
5. The WEP developed for any wireless network has no management of key for improved security of wireless network. It is a time consuming process to change the keys for developed AP’s and connected clients of any wireless network. But is an ethical duty of network administrator to make regular changes and different keys for each user.
6. The developed AP’s of wireless network can be hacked by intruders which may cause network jamming, DOS attack and SYN flood. So, maintaining availability of wireless network under these attacks is big challenge for network administrator. The use of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here