LD7008- Assignment 2(1)
docx
keyboard_arrow_up
School
University of the Fraser Valley *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
5
Uploaded by BarristerMetalTrout28
Page
1
of
4
COURSEWORK
ASSESSMENT SPECIFICATION
Module Title:
Wireless networks & Security
Module Number:
LD7008
Module Tutor
Name(s):
Dr Nasr Abosata
Academic Year:
2023/24
%
Weighting
(to
overall module):
50%
Coursework Title:
Assignment 2 - Wireless LAN vulnerabilities assessment.
Dates and Mechanisms for Assessment Submission and Feedback
Date of Handout to Students:
TBA
Mechanism for Handout to Students:
Via Blackboard; briefing via online blackboard collaborate and face 2 face session
Date and Time of Submission by Student:
Submitted on 25
th
January 2024 (no later than 16:00)
Mechanism for Submission of Work by Student:
The report in electronic format must be submitted Turnitin on Module Blackboard site.
Date by which Work, Feedback and Marks will be returned to Students:
Within 20 working days after the submission date.
Mechanism for return of assignment work, feedback and marks to students:
Formal feedback will be made available via Blackboard following completion of all
reviews and internal moderation of results.
Learning Outcomes tested in this assessment:
The following Learning outcomes will be addressed in this assignment:
LO1 Understand the global nature of WLAN standards and design.
LO2. Be able to describe, explain critically and assess
wireless and mobile data communication technologies deployed
along with associated security issues.
LO4. Apply suitable security measures to protect wireless networks
against known
weaknesses
LO5 Demonstrate their ability to work in culturally diverse groups and
teams and make appropriate and personal contributions to team
effectiveness
Coursework description
You are to perform a study on various 802.11 wireless networks in order to
choose a suitable security measure that should be put in place for a given
scenario.
This assignment is divided in two parts. The study will be partially theoretical
and technical. The technical part (part A) will requires you to evaluate the
effectiveness of using various standards against known attacks. You will then in
part B identify what are the security measures that the company in the chosen
scenario should consider implementing.
Part A: Technical flaws research
You will need to investigate several known security flaws on the various 802.11
security protocols. You should demonstrate that were able to exploit those
security flaws by exploiting them in your test environment either at home or in
the lab.
You should also consider the various possible types of deployment such as in
infrastructure deployment of 802.11 or in enterprise mode.
1.
WLAN authentication if SSID is hidden and if administrators use MAC
filtering.
2.
WLAN encryption flaws (WEP, WPA2).
3.
802.11 clients and identify flaws and they can be exploited.
Part B: Scenario based interpretation
Based on your findings in part A, you are required to analyse results obtained
and choose suitable security measures for your chosen scenario. Following
this, you are expected to defend your security choices by comparing your
justifications with different research papers discussing the effectiveness of
wireless security protocols in different environments.
Effectiveness of the chosen security measures should be evaluated in term of
how they can be exploited (if possible), how suitable they are for the
environment they will be used in and the threats that the scenario is subject to.
You will need to choose one scenario from the list below:
A small company that only allows staff to access the network.
A coffee shop that allows its customers to access the wireless network.
A large company that has various levels of access controls in their
company.
Guests only network where people can use the network for a specific time.
A home family wireless network.
Instructions
You are required to use the template available in assessment page (IEEE
template)
You are expected to use research papers and reference them in your
document.
Word count
You should not exceed 5 pages using the template with the same
font size. This is roughly around 4000 words.
Marking Schemes
Requirements
Max
mark
Abstract (max 100 words (discuss scenario))
5
Introduction
10
Technical flaws- Research how to bypass WLAN authentication if
SSID is hidden and if administrators use MAC filtering.
20
Technical flaws- Research WLAN encryption flaws (WEP, WPA2).
20
Technical flaws- Research 802.11 clients and identify flaws and
they can be exploited
15
Choose the most suitable security measures for your scenario
and justify your choice.
15
Conclusion
10
References
5
Appendix (if needed)
ASSESSMENT REGULATIONS
You are advised to read the guidance for students regarding assessment policies. They are available
online
here
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Academic Misconduct
The Assessment Regulations for Taught Awards (ARTA) contain the
Regulations and procedures
applying to cheating, plagiarism, the use of Artificial Intelligence (AI) Systems, and other forms of
academic misconduct
.
The full policy is available
here
You are reminded that plagiarism, collusion, the use of Artificial Intelligence (AI) Systems, and other
forms of academic misconduct, as referred to in the Academic Misconduct procedure of the
assessment regulations, are taken very seriously. Assignments in which evidence of plagiarism or
other forms of academic misconduct is found may receive a mark of zero.
Late submission of work
Where coursework is submitted without approval, after the published hand-in deadline, the following
penalties will apply. For coursework submitted up to 1 working day (24 hours) after the published
hand-in deadline without approval,
10% of the total marks available for the assessment
(i.e.100%)
shall be deducted
from the assessment mark.
For clarity: a late piece of work that would have scored 65%, 55% or 45% had it been handed in on
time will be awarded 55%, 45% or 35% respectively as 10% of the total available marks will have
been deducted.
The Penalty does not apply to Pass/Fail Modules, i.e. there will be no penalty for late submission if
assessments on Pass/Fail are submitted up to 1 working day (24 hours) after
the published hand-in
deadline.
Coursework submitted more than 1 day (24 hours) after the published hand-in
deadline without approval will be marked as zero but will be eligible for referral. The
reassessment should where appropriate, and as determined by the Module Leader,
be the same method (e.g. essay) but maybe with a different task (e.g. different essay
title) or with the same task (e.g. the same essay title) as indicated in the Module
handbook.
The full policy can be found
here
Word limits
The word count is to be declared on the front page of your assignment and the assignment cover
sheet.
The word count does not include:
Please note, in text citations [e.g. (Smith, 2011)] and direct secondary quotations [e.g. “
dib-dab
nonsense analysis
” (Smith, 2011 p.123)] are INCLUDED in the word count.
If this word count is falsified, students are reminded that under ARTA this will be regarded as
academic misconduct.
For those assessments where students are required to keep to the word limit, it is proposed that they
should be informed that the marker will stop reading at the point when they judge that the word
limit exceeds the recommended word count by more than 10%.
The marker will indicate the point at
which they stop reading on the text.
Students must retain an electronic copy of this assignment (including ALL appendices) and it must
be made available within 24hours of them requesting it be submitted.
The full Word Limit Policy is available
here
The time allocated for the presentation must be adhered to.
At the end of this time, the presentation
will be stopped and will be marked based on what has been delivered within the time limit.
Group Work
The group work policy can be found
here