Skip to main content

Provide in‐depth descriptions

Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018

Assessment Details and Submission Guidelines
Unit Code BN303
Unit Title Wireless Network & Security
Assessment Type Individual Assessment
Assessment Title Use of a WLAN Tools in an enterprise setting
Purpose of the
assessment (with
ULO Mapping)
a. Provide in‐depth descriptions of wireless architecture and security
vulnerabilities.
b. Conduct research and gain knowledge about different sniffing tools
c. Solve complex problems in secure wireless network designs.
d. Help enterprises to maintain and implement a secure wireless network.
Weight 20%
Total Marks 60
Word limit 1500 minimum
Due Date Week 8 Sunday 11:55pm i.e. 9th of September 2018
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2 cm margins on all four sides of your page with
appropriate section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension
If an extension of time to submit work is required, a Special
Consideration Application must be submitted directly through AMS.
You must submit this application within three working days of the
assessment due date. Further information is available at:
https://ift.tt/2JPj4MM
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness
of the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
https://ift.tt/2JPj4MM
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy
Procedure.
For further information, please refer to the Academic Integrity
Section in your Unit Description.

Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018
Assignment Description
This assignment include two tasks:
Task one: (research)
Students are required to choose four WLAN sniffing tools and write a maximum of 200
words about each tool to highlight:

How tools work
o Level of complexity
Included features
Differences from other tools

Advantages and disadvantages
screen shots (one for each tool)

o install demo versions then take screen shots – online screen shots will not be
considered
Task two:
Students are required to
1. Record WLAN access points at a public place (such as at a shopping centre, public
place, home network etc. of your choice).
2. Gather technical information about wireless network at
three different locations with
minimum of
5 APs for each location.
3. Test the
WLAN sniffing tool and report your observation and recommend how to
secure and/or manage WLAN. Your report should include:
a. Screenshots (
as an evidence) and detail explanation to report working mechanism
(the step by step process) of the identified technique.
b. Explain the use
(evaluation) of the technique to secure and/or manage WLAN.
o Discuss dual bands and its advantages
o Security implications
4. Submit a one (1) minute video along with audio to demonstrate your implementation
(the tutor must be able to recognize you in the video). Your video file format must be
compatible with video playing software available in MIT labs.
Zip all your files and submit it on Moodle as one zip folder
Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018
Marking Guide:
Marks are allocated as indicated on each question, taking the following aspects into
account:

Criteria Description Marks
Task one Explain how tools works
Level of complexity
Features, cons and pros
Differences and screen shots
The genuinely of the research
4 4 4 4 4
Task two
Sophistication and
effectiveness
Sophistication and effectiveness to secure
and/or manage WLAN
10
Report structure Inadequate structure, careless presentation,
poor writing , word limits
10
Reference style (IEEE) Minimum 5 Proper different referencing
resources
10
Video along with audio
Demonstration
Successful video demonstration To support
submitted report.
10

Marking Rubric for Exercise Answers

Grade
Mark
HD
80%+
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
< 50%
Excellent Very Good Good Satisfactory Unsatisfactory
Task one
/20
Explanation is
clear and easy
to follow with
strong
arguments
Consistency
logical and
convincing
Mostly
consistent
and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Sophisticati
on and
effectivenes
s
The presented
solution
demonstrated
The presented
solution
demonstrated
The
presented
solution
The
presented
solution
The presented
solution
demonstrated

Prepared by: Tarek Elwan Moderated by: Dr Imran Ali Jokhio July 2018

/10 an extreme
degree of
sophistication
and
effectiveness
to secure
and/or
manage WLAN
a high degree
of
sophistication
and
effectiveness
to secure
and/or
manage WLAN
demonstrat
ed an
average
degree of
sophisticati
on and
effectivenes
s to secure
and/or
manage
WLAN
demonstrate
d a low
degree of
sophisticatio
n and
effectiveness
to secure
and/or
manage
WLAN
a poor degree
of
sophistication
and
effectiveness
to secure
and/or
manage
WLAN.
Reference
style
/10
Clear styles
with excellent
source of
references.
Clear
referencing/
style
Generally
good
referencing
/style
Unclear
referencing/s
tyle
Lacks
consistency
with many
errors
Report
structure
and report
presentatio
n /
10
Proper writing.
Professionally
presented
Properly
written, with
some minor
deficiencies
Mostly
good, but
some
structure or
presentatio
n problems
Acceptable
presentation
Poor
structure,
careless
presentation
Video of
Demonstrat
ion
/10
Successful
completion
and well
understanding
of the
outcome.
Successful
completion
and
understanding
of the
outcome.
Partially
completed
and
partially
understandi
ng of the
outcome.
Partially
completed
and did not
understandin
g of the
outcome.
Not completed
and did not
understanding
of the
outcome.

 

The post Provide in‐depth descriptions appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM