Skip to main content

Provide in‐depth descriptions

Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018

Assessment Details and Submission Guidelines
Unit Code BN303
Unit Title Wireless Network & Security
Assessment Type Individual Assessment
Assessment Title Use of a WLAN Tools in an enterprise setting
Purpose of the
assessment (with
ULO Mapping)
a. Provide in‐depth descriptions of wireless architecture and security
vulnerabilities.
b. Conduct research and gain knowledge about different sniffing tools
c. Solve complex problems in secure wireless network designs.
d. Help enterprises to maintain and implement a secure wireless network.
Weight 20%
Total Marks 60
Word limit 1500 minimum
Due Date Week 8 Sunday 11:55pm i.e. 9th of September 2018
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2 cm margins on all four sides of your page with
appropriate section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension
If an extension of time to submit work is required, a Special
Consideration Application must be submitted directly through AMS.
You must submit this application within three working days of the
assessment due date. Further information is available at:
https://ift.tt/2JPj4MM
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness
of the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
https://ift.tt/2JPj4MM
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy
Procedure.
For further information, please refer to the Academic Integrity
Section in your Unit Description.

Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018
Assignment Description
This assignment include two tasks:
Task one: (research)
Students are required to choose four WLAN sniffing tools and write a maximum of 200
words about each tool to highlight:

How tools work
o Level of complexity
Included features
Differences from other tools

Advantages and disadvantages
screen shots (one for each tool)

o install demo versions then take screen shots – online screen shots will not be
considered
Task two:
Students are required to
1. Record WLAN access points at a public place (such as at a shopping centre, public
place, home network etc. of your choice).
2. Gather technical information about wireless network at
three different locations with
minimum of
5 APs for each location.
3. Test the
WLAN sniffing tool and report your observation and recommend how to
secure and/or manage WLAN. Your report should include:
a. Screenshots (
as an evidence) and detail explanation to report working mechanism
(the step by step process) of the identified technique.
b. Explain the use
(evaluation) of the technique to secure and/or manage WLAN.
o Discuss dual bands and its advantages
o Security implications
4. Submit a one (1) minute video along with audio to demonstrate your implementation
(the tutor must be able to recognize you in the video). Your video file format must be
compatible with video playing software available in MIT labs.
Zip all your files and submit it on Moodle as one zip folder
Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018
Marking Guide:
Marks are allocated as indicated on each question, taking the following aspects into
account:

Criteria Description Marks
Task one Explain how tools works
Level of complexity
Features, cons and pros
Differences and screen shots
The genuinely of the research
4 4 4 4 4
Task two
Sophistication and
effectiveness
Sophistication and effectiveness to secure
and/or manage WLAN
10
Report structure Inadequate structure, careless presentation,
poor writing , word limits
10
Reference style (IEEE) Minimum 5 Proper different referencing
resources
10
Video along with audio
Demonstration
Successful video demonstration To support
submitted report.
10

Marking Rubric for Exercise Answers

Grade
Mark
HD
80%+
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
< 50%
Excellent Very Good Good Satisfactory Unsatisfactory
Task one
/20
Explanation is
clear and easy
to follow with
strong
arguments
Consistency
logical and
convincing
Mostly
consistent
and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Sophisticati
on and
effectivenes
s
The presented
solution
demonstrated
The presented
solution
demonstrated
The
presented
solution
The
presented
solution
The presented
solution
demonstrated

Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018

/10 an extreme
degree of
sophistication
and
effectiveness
to secure
and/or
manage WLAN
a high degree
of
sophistication
and
effectiveness
to secure
and/or
manage WLAN
demonstrat
ed an
average
degree of
sophisticati
on and
effectivenes
s to secure
and/or
manage
WLAN
demonstrate
d a low
degree of
sophisticatio
n and
effectiveness
to secure
and/or
manage
WLAN
a poor degree
of
sophistication
and
effectiveness
to secure
and/or
manage
WLAN.
Reference
style
/10
Clear styles
with excellent
source of
references.
Clear
referencing/
style
Generally
good
referencing
/style
Unclear
referencing/s
tyle
Lacks
consistency
with many
errors
Report
structure
and report
presentatio
n /
10
Proper writing.
Professionally
presented
Properly
written, with
some minor
deficiencies
Mostly
good, but
some
structure or
presentatio
n problems
Acceptable
presentation
Poor
structure,
careless
presentation
Video of
Demonstrat
ion
/10
Successful
completion
and well
understanding
of the
outcome.
Successful
completion
and
understanding
of the
outcome.
Partially
completed
and
partially
understandi
ng of the
outcome.
Partially
completed
and did not
understandin
g of the
outcome.
Not completed
and did not
understanding
of the
outcome.

 

The post Provide in‐depth descriptions appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

Controversy Associated With Dissociative Disorders

 Assignment: Controversy Associated With Dissociative Disorders The  DSM-5-TR  is a diagnostic tool. It has evolved over the decades, as have the classifications and criteria within its pages. It is used not just for diagnosis, however, but also for billing, access to services, and legal cases. Not all practitioners are in agreement with the content and structure of the  DSM-5-TR , and dissociative disorders are one such area. These disorders can be difficult to distinguish and diagnose. There is also controversy in the field over the legitimacy of certain dissociative disorders, such as dissociative identity disorder, which was formerly called multiple personality disorder. In this Assignment, you will examine the controversy surrounding dissociative disorders. You will also explore clinical, ethical, and legal considerations pertinent to working with patients with these disorders. Photo Credit: Getty Images/Wavebreak Media To Prepare · Review this week’s Learning

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom