LD7008- Assignment 2(1)

docx

School

University of the Fraser Valley *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by BarristerMetalTrout28

Report
Page 1 of 4 COURSEWORK ASSESSMENT SPECIFICATION Module Title: Wireless networks & Security Module Number: LD7008 Module Tutor Name(s): Dr Nasr Abosata Academic Year: 2023/24 % Weighting (to overall module): 50% Coursework Title: Assignment 2 - Wireless LAN vulnerabilities assessment. Dates and Mechanisms for Assessment Submission and Feedback Date of Handout to Students: TBA Mechanism for Handout to Students: Via Blackboard; briefing via online blackboard collaborate and face 2 face session Date and Time of Submission by Student: Submitted on 25 th January 2024 (no later than 16:00) Mechanism for Submission of Work by Student: The report in electronic format must be submitted Turnitin on Module Blackboard site. Date by which Work, Feedback and Marks will be returned to Students: Within 20 working days after the submission date. Mechanism for return of assignment work, feedback and marks to students: Formal feedback will be made available via Blackboard following completion of all reviews and internal moderation of results.
Learning Outcomes tested in this assessment: The following Learning outcomes will be addressed in this assignment: LO1 Understand the global nature of WLAN standards and design. LO2. Be able to describe, explain critically and assess wireless and mobile data communication technologies deployed along with associated security issues. LO4. Apply suitable security measures to protect wireless networks against known weaknesses LO5 Demonstrate their ability to work in culturally diverse groups and teams and make appropriate and personal contributions to team effectiveness Coursework description You are to perform a study on various 802.11 wireless networks in order to choose a suitable security measure that should be put in place for a given scenario. This assignment is divided in two parts. The study will be partially theoretical and technical. The technical part (part A) will requires you to evaluate the effectiveness of using various standards against known attacks. You will then in part B identify what are the security measures that the company in the chosen scenario should consider implementing. Part A: Technical flaws research You will need to investigate several known security flaws on the various 802.11 security protocols. You should demonstrate that were able to exploit those security flaws by exploiting them in your test environment either at home or in the lab. You should also consider the various possible types of deployment such as in infrastructure deployment of 802.11 or in enterprise mode. 1. WLAN authentication if SSID is hidden and if administrators use MAC filtering. 2. WLAN encryption flaws (WEP, WPA2). 3. 802.11 clients and identify flaws and they can be exploited. Part B: Scenario based interpretation Based on your findings in part A, you are required to analyse results obtained and choose suitable security measures for your chosen scenario. Following this, you are expected to defend your security choices by comparing your justifications with different research papers discussing the effectiveness of wireless security protocols in different environments.
Effectiveness of the chosen security measures should be evaluated in term of how they can be exploited (if possible), how suitable they are for the environment they will be used in and the threats that the scenario is subject to. You will need to choose one scenario from the list below: A small company that only allows staff to access the network. A coffee shop that allows its customers to access the wireless network. A large company that has various levels of access controls in their company. Guests only network where people can use the network for a specific time. A home family wireless network. Instructions You are required to use the template available in assessment page (IEEE template) You are expected to use research papers and reference them in your document. Word count You should not exceed 5 pages using the template with the same font size. This is roughly around 4000 words. Marking Schemes Requirements Max mark Abstract (max 100 words (discuss scenario)) 5 Introduction 10 Technical flaws- Research how to bypass WLAN authentication if SSID is hidden and if administrators use MAC filtering. 20 Technical flaws- Research WLAN encryption flaws (WEP, WPA2). 20 Technical flaws- Research 802.11 clients and identify flaws and they can be exploited 15 Choose the most suitable security measures for your scenario and justify your choice. 15 Conclusion 10 References 5 Appendix (if needed) ASSESSMENT REGULATIONS You are advised to read the guidance for students regarding assessment policies. They are available online here .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Academic Misconduct The Assessment Regulations for Taught Awards (ARTA) contain the Regulations and procedures applying to cheating, plagiarism, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct . The full policy is available here You are reminded that plagiarism, collusion, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct, as referred to in the Academic Misconduct procedure of the assessment regulations, are taken very seriously. Assignments in which evidence of plagiarism or other forms of academic misconduct is found may receive a mark of zero. Late submission of work Where coursework is submitted without approval, after the published hand-in deadline, the following penalties will apply. For coursework submitted up to 1 working day (24 hours) after the published hand-in deadline without approval, 10% of the total marks available for the assessment (i.e.100%) shall be deducted from the assessment mark. For clarity: a late piece of work that would have scored 65%, 55% or 45% had it been handed in on time will be awarded 55%, 45% or 35% respectively as 10% of the total available marks will have been deducted. The Penalty does not apply to Pass/Fail Modules, i.e. there will be no penalty for late submission if assessments on Pass/Fail are submitted up to 1 working day (24 hours) after the published hand-in deadline. Coursework submitted more than 1 day (24 hours) after the published hand-in deadline without approval will be marked as zero but will be eligible for referral. The reassessment should where appropriate, and as determined by the Module Leader, be the same method (e.g. essay) but maybe with a different task (e.g. different essay title) or with the same task (e.g. the same essay title) as indicated in the Module handbook. The full policy can be found here Word limits The word count is to be declared on the front page of your assignment and the assignment cover sheet. The word count does not include: Please note, in text citations [e.g. (Smith, 2011)] and direct secondary quotations [e.g. “ dib-dab nonsense analysis ” (Smith, 2011 p.123)] are INCLUDED in the word count. If this word count is falsified, students are reminded that under ARTA this will be regarded as academic misconduct. For those assessments where students are required to keep to the word limit, it is proposed that they should be informed that the marker will stop reading at the point when they judge that the word
limit exceeds the recommended word count by more than 10%. The marker will indicate the point at which they stop reading on the text. Students must retain an electronic copy of this assignment (including ALL appendices) and it must be made available within 24hours of them requesting it be submitted. The full Word Limit Policy is available here The time allocated for the presentation must be adhered to. At the end of this time, the presentation will be stopped and will be marked based on what has been delivered within the time limit. Group Work The group work policy can be found here