Perform analysis on a real large-scale wireless network

Assignment Help Computer Network Security
Reference no: EM131624070

Purpose of the assessment

a. Provide in-­-depth descriptions of wireless architecture and security vulnerabilities.
b. Solve complex problems in secure wireless network designs.
c. Help enterprises to maintain and implement a secure wireless network.

Assignment Description

Perform analysis on a real large-scale wireless network. Collect data about access points and evaluate security situation using the most suitable WLAN sniffing tool (Netspot, Acrylic, Android app etc.) of your choice. Data collection must include technology used, deployed network types, channels, data rates and interference with other networks, security protocols etc. Prepare a technical report according to the specification below. You report should include the following:

1. Record WLAN access points at a public place (such as at a shopping centre, public place, home network etc. of your choice).

2. Gather technical information about wireless network at three different locations with minimum 10 APs for each location.

3. Test the WLAN sniffing tool and report your observation and recommend how to secure and/or manage WLAN. Your report should include:

a. Tables for each location containing all technical details about WLAN setup from your findings.

b. Screenshots (as an evidence) and detail explanation to report working mechanism (the step by step process) of the identified technique.

c. Explain the use (evaluation) of the technique to secure and/or manage WLAN.

i. Discuss dual bands and it's advantages
ii. Security implications
iii. Others aspect such as special network, multiple SSIDs and vendors etc.

Verified Expert

This report is about the use of WLAN TOOLS that are used to manage wireless networks, where in this report we choose to use the acrylic software, that when is installed it shows all the available WLANs within a given local area, and giving information about each network. This information can be used to manage the network and help secure it accordingly.

Reference no: EM131624070

Questions Cloud

Contrast different possible business entities : Discussion based on A friend asked you to help her decide how to protect her soon to be opened bakery from liability
Prepare the company schedule of cost of goods : Information for Jason Metalworks as of December 31 follows. Prepare the company's schedule of cost of goods manufactured for the year ended December 31
What is the margin and will there be a margin call : An investor short sells 100 shares of a stock for $20 per share. The initial margin is 50%, and the maintenance margin is 30%.
Why would your chosen organization benefit from a consultant : Why would your chosen organization benefit from a consultant on this project? What could a consultant bring that the organization does not have?
Perform analysis on a real large-scale wireless network : Provide in-­-depth descriptions of wireless architecture and security vulnerabilities - Solve complex problems in secure wireless network designs.
Discuss who does jacob lawyer go after for the lawsuit : running out side a big building corporation like Coca Cola in the city of Detroit
What is the minimum amount of equity : You are an investor who bought 100 shares of a company at $35 per share with a stock on margin of 60%.
Find at least ten pieces of spam mail from any account : Find at least 10 pieces of spam mail from any account, whether it be home, work, school or something else.
Prepare janes company net cash flow : Prepare Jane's company 's 2014 Net Cash Flow from Operating Activities section of a statement of cash flows, using the indirect method

Reviews

inf1624070

10/20/2017 5:55:39 AM

Very professional and also went above and beyond my expectations. By completing the assignment within such a short time frame and getting it back to me very early. And except just a small correction everything was fantastic. thanks for the same.

inf1624070

10/20/2017 5:54:53 AM

Donot need to do video part and for ur others questions please follow the assignment details files which i was send u and follow according those criteria Yup real time and u can use restamper software may b it will be helpful Everything is ok but could u please mentioned the in text citation

len1624070

9/2/2017 2:34:57 AM

Marking aspects: Marks are allocated as indicated on each question, taking the following aspects into account: Criteria Description Marks Evaluation Explain the use of the technique 10 Sophistication and effectiveness Sophistication and effectiveness to secure and/or manage WLAN 10 Explanation Description/explain how to use the technique 10 Report structure Inadequate structure, careless presentation, poor writing 10 Reference style (IEEE) Proper referencing if required 10 Video along with audio Demonstration Successful video demonstration To support submitted report. 10

Write a Review

Computer Network Security Questions & Answers

  Outline a plan for the growth of an addressing and naming

outline a plan for the development of an addressing and naming model in an environment of the following scenarioten 10

  How their software is in fact not high assurance software

How would you explain to this company how their software is in fact not high assurance" software?

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  Describe the relevant technologies

Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)

  What are the three components of the cia triangle

What are the three components of the CIA triangle? Describe what they are used for and provide examples of threats that could impact each component.

  Identify at least four functions of the cio using the ebk

Identify at least four functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization.

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  What challenges does law enforcement face

What challenges does law enforcement face in controlling Child Pornography? How can law enforcement deal with this problem?

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd