MN603-T1-2019-Assignment 2.V1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Assessment Details and Submission Guidelines

Trimester T1 2019
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment Group Assignment
Type
Assessment Design and implementation of secure enterprise wireless network for an
Title apartment block.
Purpose of the The purpose of this assignment is to design and implement a secure enterprise
assessment wireless network, considering the ethical implications. The assignment covers
(with ULO the following Unit Learning Outcomes:
Mapping) d. Apply and evaluate wireless network security techniques in
consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.
Weight 20%
Total Marks 100
Word limit 2000 - 2500
Due Date 31/05/2019 5:00 PM
Submission  All work must be submitted on Moodle by the due date along with a
Guidelines completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic  Academic Misconduct is a serious offence. Depending on the seriousness of
Misconduct the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha May, 2019
MN603 Wireless Networks and Security Page # 2 of 4

Assignment Description

Secure enterprise wireless local area networks LANs are an important component of modern network
architecture. Such networks are required to support mobile devices and provide connectivity where wired
connections are not practical or cost prohibitive.

Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot
zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many
of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to
try and access confidential enterprise information. Securing a wireless LAN is not hard – industry advances in
technology and vendor innovation makes this easier than ever.

WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server,
configuring access points with the encryption and RADIUS server information, configuring your operating
system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.

The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who
wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication
server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

This assignment requires the students to design and implement a secure enterprise wireless network for an
apartment block, considering the ethical implications and the requirements of a modern apartment block. The
students are required to complete the following tasks and submit a report on Moodle.

1. Explore the ethical implications in the design and implementation of a secure enterprise wireless
network for an apartment block.

2. Identify and analyse the requirements of an apartment block, considering the issues of multi dwelling
and justify the use of WLANs in this scenario

3. Design a secure enterprise wireless network for an apartment block, employing a standard industry
tool.

4. Analysis of the secure enterprise wireless network using WPA2 and the RADIUS server, considering
the following aspects:

a. Confidentiality
b. Integrity
c. Availability
d. Security
e. Privacy

5. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server for an
apartment block.

6. Demonstrate the network security against attacks.

7. Demonstration in Week 11 during the Lab.

The tutor will assign the groups; maximum number of students in a group is 4 and minimum. The students in
each group should be from the same lab. Each member of the group will be assessed individually in the
demonstration.
Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha May, 2019
MN603 Wireless Networks and Security Page # 3 of 4

Marking criteria:

Section to be included in Description of the section Marks


the report
Introduction Outline of the report. 5
Report Layout Report layout, style, structure and language. 5
Explore ethical Investigate and report the ethical implications in the 5
implications design and implementation of a secure enterprise wireless
network for an apartment block.
Identify and analyse the Identify and analyse the requirements of an apartment 10
requirements of an block, considering the issues of multi dwelling and justify
apartment block the use of WLANs in this scenario
Design secure enterprise Design a secure enterprise wireless network for an 15
wireless network apartment block, employing a standard industry tool.
Analyse secure Analysis of the secure enterprise wireless network using 10
enterprise wireless WPA2 and the RADIUS server, considering the following
network aspects:
a. Confidentiality
b. Integrity
c. Availability
d. Security
e. Privacy
Implement secure Implementation of a secure enterprise wireless network 15
enterprise wireless using WPA2 and the RADIUS server for an apartment
network block.
Testing and verification Use relevant tools to demonstrate if network is secure 5
against attacks
Demonstration Demonstration in Week 11 during the Lab. 20
Conclusion Write summary of the report 5
Reference style Follow IEEE reference style 5
Total 100

Marking Rubric for Assignment #2: Total Marks 100

Grade HD DI CR P Fail
Mark 80-100 70-79 60-69 50-59 <50
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction All topics are Topics are Generally Some relevance This is not
pertinent and relevant and relevant and and briefly relevant to the
/5 covered in depth. soundly analysed. presented. assignment
Ability to think analysed. topic.
critically and
source material is
demonstrated
Report Layout Exceptional report Very good Good report Acceptable Poor report
layout, style and report layout, style report layout, layout, style
/5 language used layout, style and language style and and language
and used language used. used.
language
used

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha May, 2019
MN603 Wireless Networks and Security Page # 4 of 4

Explore ethical Finding is clearly Finding is Finding is Finding is not Finding is not
implications linked and well clearly linked and linked and available
justified linked and convincing unjustified
/5 justified

Identify and Excellent Excellent Good Identified and Failed to


analyse the identification and identificatio identification analysed the identify and
requirements analysis of the n and good and good requirements of analyse the
of an requirements, of analysis of analysis of the an apartment requirements
apartment an apartment the requirements, block. of an
block block requirement of an apartment
s, of an apartment block
/10 apartment block
block
Design secure Demonstrated Demonstrat Demonstrate d Demonstrated Did not
enterprise excellent ability to ed good good ability to ability to think demonstrate
wireless think critically and ability to think critically critically and ability to think
network present an think and present a present a design critically and
/15 exceptional design critically and good design present a
considering all the present an considering all design.
requirements exceptional the
design requirements.
considering
all the
requirement
s
Analyse secure Excellent analysis Good Good analysis Some analysis Lacking analysis
enterprise included WPA2 analysis included WPA2 provided and of WPA2 and
wireless and RADIUS and included and RADIUS included WPA2 RADIUS.
network covered all WPA2 and and RADIUS
aspects. RADIUS and
/10 covered
some
aspects.
Implement All elements are Components Components Most Proposal lacks
secure present and very present with present and components structure.
enterprise well integrated. good mostly well present
wireless cohesive integrated
network
/20
Testing and All Tests were All Tests Tests were Tests were Tests were not
Verification conducted and were conducted and conducted. conducted.
good analysis conducted analysis
/5 provided. and analysis provided.
provided.
Demonstration Logic is clear and Consistency Mostly Adequate Demonstration
easy to follow with logical and consistent cohesion and is confused and
/20 strong arguments convincing logical and conviction disjointed
convincing
Conclusion Logic is clear and Consistency Mostly Adequate Argument is
easy to follow with logical and consistent cohesion and confused and
/5 strong arguments convincing logical and conviction disjointed
convincing
Reference style Clear styles with Clear Generally good Sometimes Lacks
excellent source of referencing referencing clear consistency
/5 references. style style referencing with many
style errors

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha May, 2019

You might also like