Design and implement a secure enterprise wireless

Assignment Help Strategic Management
Reference no: EM132397958 , Length: word count:600

Assessment - Design and implementation of secure enterprise wireless network

Purpose of the assessment -

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

d. Apply wireless network security techniques in the context of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

You are hired to secure a wireless enterprise network. Your client wishes to build a secure wireless network where the visitors can access the Internet whilst their internal data is protected from the visitors or hackers. You are to provide a full report and demonstrate a prototype of network in a simulated platform (i.e. packet tracer or GNS3).

Secure enterprise wireless local area networks can provide mobility and connectivity where wired connections are not practical. Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the malicious hackers to try and access confidential enterprise information.

Recent advances in WPA2-Enterprise deployment include: installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

In your report, you are to design and implement a secure enterprise wireless network, considering the ethical implications. You are required to complete the following tasks and submit a report on Moodle.

1. Discuss the ethical implications in the vulnerabilities of wireless network technologies.

2. Design a secure enterprise wireless network using the network simulator of your choice.

*3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following CIAAA elements:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network

6. Demonstration of your network prototype in Week 11 lab.

The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group should be from the same lab.

Note: Need to do only task 3.

Reference no: EM132397958

Questions Cloud

Discussing the use of encryption to protect data : Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
Emerging enterprise network applications : Research at least two articles on the topic of emerging enterprise network applications. Write a brief synthesis and summary of the two articles.
Information security and risk management : How the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.
Identify a variety of epistemological theory : Identify and apply a variety of epistemological theory. Understand the difference between a rhetorically good argument and a rationally good argument.
Design and implement a secure enterprise wireless : BN303 - Wireless Networks and Security - Design and implement a secure enterprise wireless network, considering the ethical implications
Creating company E-mail and wifi-internet use policies : Creating company E-mail and wifi/internet use policies
Describe the different staffing initiatives : As the authors discussed, evaluating a staffing system allows the organization to objectively assess how well its different staffing initiatives are working.
Critique the finding of the nevada supreme court : In the 1997 case of University and Community College System of Nevada v Farmer, Farmer was initially awarded $40K in damages for violation of the Equal Pay Act.
Security monitoring system : You are a team of security consultants for a small company and the owner would like you to purchase cameras to install as part of a security monitoring system

Reviews

Write a Review

Strategic Management Questions & Answers

  Case study in strategic plan adelphi art centre

Strategic plan or strategic planning of  Adelphi Art Centre in Adelphi, Australia.

  Pestle analysis of a new uk based business plan

Key trend of PESTEL tool  analysis in UK in the next three years.

  Diversity reflection paper

This document describes an exercise that could used to increase students' sensitivity to workforce diversity and related issues of power.

  Crafting a personal vision and mission statement

Crafting a Personal Vision and Mission Statement

  Business strategy and strategic human resource management

This project report describes the co-ordination and alignment of business strategy with strategic human resource management.

  Steak sauce - lawry’s defense: case analysis

Steak Sauce: Lawry's Defense" case to complete a formal written case analysis

  Write a report on best buy strategic audit

Write a report on best buy strategic audit which inhibits the corporate governance, corporate culture, and under Corporate Resources.

  Cross-cultural management

To develop an awareness and comprehensive understanding of the influence of culture on management

  Calculate the expected value of returns of stock

Calculate the expected value of returns of stock.

  Influence the making of public policy

Write a paper on interest groups and how they seek to influence the making of public policy.

  Strategic management principles

Strategic Management principles

  Resource base view theory versus positioning theory

Explain Resource Base View theory versus Positioning theory

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd