Implementation of secure enterprise wireless network

Assignment Help Computer Networking
Reference no: EM132118616 , Length: word count:2200

Design and implementation of secure enterprise wireless network

Purpose of the assessment  (with ULO Mapping)

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications.

The assignment covers the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications.

The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network.

2. Design a secure enterprise wireless network, employing BosonNetsim.

3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization

4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.

5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for the different phases of authentication, association, de-association, and pinging each other's terminals on the same network

Reference no: EM132118616

Questions Cloud

Is it integrated with the company business strategy : What is the current human resources strategy for your company? Is it integrated with the company’s business strategy?
Draw a neat and well-labeled graph : John has income of $200 each month to spend on day passes to the gym (x) and food (y). Assume both of these goods are continuously divisible.
Write an algorithm for pseudo random number generator : Question - Write an algorithm for pseudo random number generator
Describe in which circumstances in your professional life : Describe in which circumstances in your professional life where you utilized your potential:
Implementation of secure enterprise wireless network : Explore the ethical implications in the design and implementation of a secure enterprise wireless network - Design a secure enterprise wireless network
Performance appraisal and competency systems add value : How formal performance appraisal and competency systems add value (or otherwise) to the process of identfying learning needs?
Develop nausea and vomiting holiday parties : Suppose at random 35% of school children develop nausea and vomiting following holiday parties and that you conduct a study to examine this phenomenon
Why health care professionals should have a firm : She wants you to prepare a 3-4-page Code of Ethics document that will also include a one page personal and professional code of conduct.
Potential employee as well as to current employees : Describe three trends in human resource management. discuss its implication to a prospective, potential employee as well as to current employees

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd