Identify suitable products that could used to resolve issues

Assignment Help Computer Network Security
Reference no: EM131974920

Wireless Security Assignment

Scenario

Rare Vintage Auto Parts Ltd supplies automotive parts to car mechanics, car dealerships, and the mining industry and lately to the enthusiastic motorists. There are 4 offices and 1 warehouse from where all stock is sourced. Currently the inventory system is located at the warehouse and is accessed on and expensive fixed 512Kbit lines.

The shops are geographically spread out as per the map below which is not to scale. The shops are located in Cockburn Central next to the Jandakot airport due to easy access for shipping parts over to customers, Kalamunda, Cottesloe, Bayswater (being the main Head Office) and Joondalup. Rare Vintage Auto Parts Ltd has recently had some issues in regards to the smooth running of their business. You have been assigned by your boss to assess and report on resolution strategies for the customer - i.e. Rare Vintage Auto Parts Ltd.

The Rare Vintage Auto Parts Ltd business generate a base turnover of $50 million per year with 150 employees. Over 50% of business revenue is from credit card transactions. The tills in the Bayswater (main head office and store) use wireless connections to communicate to the organisation network.

The company's main head office and store computer network is entirely wireless based as the business is located in a heritage listed building. The Cockburn Central store has a wired computer network but has wireless connectivity for the tills which seems to experience intermittent dropouts.

Both stores network via wireless link to the Bayswater Head office and shop for inventory. In addition, each store seem to have an access point so that the staff at each store can use handheld devices (such as PDAs, Smart devices, etc..) to take inventory, and another Access Point (AP) so that managers can use laptops in their office.

The incident

Last month, the company had to sack its IT Administrator for accessing illicit material after his 3rd warning. The IT administrator became hostile and had to be ejected from the premises by the police. In the meantime, one of the senior managers with very poor IT understanding has been tasked to managed the company computer network whilst you investigate and Later that afternoon the network for the Cottesloe shop became unserviceable.

Another concern that was mentioned by The Rare Vintage Auto Parts Ltd personnel was that the intermittency between Kalamunda and Joondalup store was more frequent. Connectivity to the Bayswater inventory is reliable but there are now errors in shipment because of an untraceable error. Orders arrive in correct order but when the automated deliveries are sent out quantities are wrong for 60% of orders causing massive restocking costs and loss of reputation.

The owner believes that the ex-IT Administrator is behind this as he was responsible for the commissioning of wireless systems, links, tills and deployment of the wireless network where all the shops including main head office/store would be able to communicate wirelessly. Police have been unable to respond or provide any detail. The person supporting the issue with the SQL inventory system has been unable to provide any data to explain the shipping errors. The account passwords and other traces of the old IT administrator have been cleansed from the system and were not traceable any more.

Current Wireless Installation Details

The information provided below was the only information that was left behind in a file by the ex-IT administrator found in one of the file cabinets.

- All sites are using 16Dbi omni-directional antennae's on 16 meter towers with 2 Watt injectors that connect to 200mw APs (Linksys WRT54G)

- The APs in the store are a mix of Cisco 1200 series APs

- Managerial AP is Cisco 1200 series at 100mW

- Inventory AP is Netgear WG602 at 100mW with 6dBi antenna

- Wireless cards are a mix of 802.11b and g cards from Netgear, Proxim and DLink

- There are some wireless tills

- WEP Encryption is being used

- SSID is Rare Vintage Auto Parts Ltd and is broadcasting

- No Firewall, VPN or other countermeasure except virus protection

- All Infrastructure is running on 172.16.0.0/16 network

Note: All the provided data for the current wireless installation details might not be the correct setup and it will be your responsibility to make the necessary assumptions while accounting for the new wireless design and deployment.

Task Details

Your report should detail the points as indicated in the Marks Allocation Guide below with the marks allocation and be addressed primarily to the management of Rare Vintage Auto Parts Ltd who are not security or IT experts. Note - the list of current installation above is NOT a list of issues - it is your job to identify the issues and to address them all in your report submission.

Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues. Your solution should exemplify best practice and produce a secured wireless installation for Rare Vintage Auto

Parts Ltd. The use of appendices is encouraged. Material in appendices does not contribute to word count. You have also been tasked to design and create a Bring Your Own Device Policy (BYOD) for Rare Vintage Auto Parts Ltd which was supposed to be implemented along the wireless network.

Report Length: 4000-5000 Words

The report should be set out in the following manner:

- 12 point Times New Roman
- 1.5 line spaced
- Margins set to 2.5 cm
- Justification - block justified
- Footer - Should contain your StudentID and Full Name (8 point type) and a Page number

The report should contain an index and have appropriate headings and sub headings. The style of the report is a business report and as such it is expected that you present a professional report in both format and style. It should also include the following:

- A detailed plan of hardware, software and equipment needed to achieve secure interconnection between all sites and in-house as well.

- Detailed security plans for deployment of 802.11 wireless and PDA/Mobile/Tablet solution for both the main head office/store and the remaining shops.

- Detailed risk analysis, plus resultant security countermeasures and policy to protect integrity and confidentiality of total network based upon this 802.11 deployment.

Attachment:- Wireless-Security-Assignment.rar

Reference no: EM131974920

Questions Cloud

Mean pulse rate of college students : Suppose the mean pulse rate of college students is 68 beats per minute with a standard deviation of 11.5.
What historical event had the greatest impact on missions : What historical event or movement from the readings this week do you think has had the greatest impact on missions today?
Find the probability that z lies : If z is a standard normal variable, find the probability that z lies between -2.41 and 0.
Find the average amount per claim for auto body repairs : An automobile insurance firm wants to find the average amount per claim for auto body repairs. Its summary records combine amounts
Identify suitable products that could used to resolve issues : Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues.
Please assist with the statistics question : Please assist with the following Statistics question: If an experiment is conducted with 5 conditions and 6 subjects in each condition, what are dfn and dfe?
Analysis of variance results : The analysis of variance results obtained from software are below. The significance level is 0.05 in testing the null hypothesis.
Discuss the role of cross-cultural workers in empowering : Discuss the role of cross-cultural workers in empowering and supporting local churches or church planting movements. Focus your answer on contexts outside.
How might the b&q approach to diversity encourage individual : How might the B&Q approach to diversity encourage individuals (both staff and customers) to contribute to the organisation's performance?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Represent the encryption of plaintext

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Suppose y = DES(x, K) and y' = DES(c(x), c(K)), where c(·) denotes the bitwise complement of its argument

  Create a simple example of a substitution-based cipher

A major university in Illinois used to place the computer output from student jobs on a table in the computer room. This room is the same computer room.

  Determine how rootkits can be used

Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given ..

  Question about system maintenance

The 4-types of IT system maintenance also apply to other industries. Assume you were in charge of aircraft maintenance for a small airline.

  Identify the security practice guideline that you believe

identify the security practice guideline that you believe consumers should educate themselves with the most in order to keep their data private and job secure.

  Develop a security plan for a threat detection system

Your task is to develop a Security Plan for a threat detection system employing relevant technologies. The Plan could be divided into the following sections: An overarching guideline.

  Which of the following acts have made it a crime to break

question 1the computer fraud and abuse act of 1986 prohibits .answer threatening to damage computer systems in order to

  Explain common organizational security threats

Create either a PowerPoint presentation, or a training manual, that will help get the team to think about security. This training document should cover the following key areas: 1. Explain common organizational security threats (avenues of attack).

  Identify management opportunities in the cloud

Security threats in cloud-based solutions with risk management strategies. Identify management opportunities in the cloud.

  A web session can be protected against the eavesdroping

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016.

  Describe application of network security and management

Evaluate the ethical concerns that communication networks raise in a global context. Describe the application of network security and network management in communication technology environments.

  Explicate the steps you would take to plan a budget for lab

Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd