Secure enterprise wireless network for an apartment block

Assignment Help Computer Networking
Reference no: EM132313469 , Length: word count:2500

Design and implementation of secure enterprise wireless network for an apartment block.

Purpose of the assessment

The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes:

d. Apply and evaluate wireless network security techniques in consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard - industry advances in technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network for an apartment block, considering the ethical implications and the requirements of a modern apartment block. The students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless network for an apartment block.

2. Identify and analyse the requirements of an apartment block, considering the issues of multi dwelling and justify the use of WLANs in this scenario

3. Design a secure enterprise wireless network for an apartment block, employing a standard industry tool.

4. Analysis of the secure enterprise wireless network using WPA2 and the RADIUS server, considering the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Security
e. Privacy

5. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server for an apartment block.

6. Demonstrate the network security against attacks.

7. Demonstration in Week 11 during the Lab.

The tutor will assign the groups; maximum number of students in a group is 4 and minimum. The students in each group should be from the same lab. Each member of the group will be assessed individually in the demonstration.

Reference no: EM132313469

Questions Cloud

Assessing whether a contract was formed : What factors and contractual elements will you consider in assessing whether a contract was formed?
Identify the importance of leadership qualities for managers : LEMT305 Leadership for Managers Assignment - Self-Reflective Journal, Kent Institute, Australia. Identify the importance of leadership qualities for managers
Do you feel less safe that businesses can track : Do you feel less safe that businesses can track your activities on the internet? Should legislation be put in place to protect consumers from the internet?
Workplace behaviour unless they can prove what : An employer can be held liable for any unlawful workplace behaviour unless they can prove what?
Secure enterprise wireless network for an apartment block : Design and implementation of secure enterprise wireless network for an apartment block - Apply and evaluate wireless network security techniques
Paris convention and patent cooperation treaty of 1994 : China is now part of the Paris Convention and Patent Cooperation Treaty of 1994. Would you still trust your invention in this country?
Excel sheet of ms-drgs used for an annual report : How do you analyze an excel sheet of MS-DRGS used for an annual report, to put into corporate letter showing the potential liability
Wallace stevens poem the death of a soldier : Then analyze the view of war in poem with view of war in Faulkner's story "Two Soldiers." Your essay should be well- developed and well-supported with texts
How should the appeals court rule : Plaintiff shipped to Defendant-Pizza Pride Inc. of Jamestown, North Carolina-an order of mozzarella cheese totaling $11,000. That same day, Plaintiff mailed Def

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd