COURSEWORK
Assignment Specification
Module
Title |
Wireless networks &
Security |
Module number: |
xxxxxxx |
Module Tutor
Name(s): |
xxxxxxxxxx |
Academic Year: |
2020/21 |
% Weighting (to overall module): |
50% |
Coursework
Title: |
Exploiting vulnerabilities
in WLAN |
Average Study
Time Required by Student: |
100 study hours assignment |
Dates
and mechanisms for Assessment Submission and feedback
Date of
Handouts to Students: 13/10/2020 |
Mechanism for Handout to Students: elp |
Date and Time of Submission by Student: on or
before 24th Jan 2021 by 15:59 |
Mechanism for
Submission of Work by Student: Turnitin |
Date by which
Work, Feedback and Marks will be returned to Students: |
Mechanism
for return of assignment work, feedback and marks to students: via
Gradebook/Turnitin |
Introduction
You are to perform a study on various
802.11 wireless networks in order to choose a suitable security measures that
should be put in place for a given scenario.
This assignment is divided in two
parts. The study will be partially theoretical and technical. The technical part will require
you to evaluate the effectiveness of using various standards against known attacks.
You will then in part B identify what are the security measures that the
company in the chosen scenario should consider
implementing.
Part A: Technical flaws research
You
will need to research several
known security flows
on the various 802.11 security protocols. You should also
consider the various possible types of deployment such as in infrastructure
deployment of 802.11 or in enterprise mode.
·
Research how to bypass WLAN
authentication if SSID is hidden and if administrators use MAC filtering.
·
Research WLAN encryption flaws (WEP, WPA2).
·
Research 802.11 clients and identify flaws and they
can be exploited.
Part B: Research
Based Work
Based on your findings in part A, you
are required to analyse results obtained and choose suitable security measures
for your chosen scenario. Following this, you are expected to defend your
security choices by comparing your justifications with different research
papers discussing the effectiveness of wireless security protocols in different
environments.
Effectiveness of the chosen
security measures should be evaluated in term of how they can
be exploited (if possible), how suitable they are for the environment they will be used
in and the threats that the scenario is subject to.
You will need
to choose one scenario from the list below:
·
A small company that only allows staff to access the network.
·
A coffee shop that allows its customers to access
the wireless network.
·
A large company that has various levels of access
controls in their company.
·
Guests only network where people can use the network
for a specific time.
·
A home family wireless network.
Learning Outcomes
The following Learning outcomes will be addressed in this assignment:
•
LO2.
Be able to describe, explain critically and assess wireless
and mobile data communication technologies deployed along with associated
security issues.
•
LO3.
Critically analyse 802.11 protocol information and
demonstrate skills in designing secure wireless networks
•
LO4.
Apply suitable security measures to protect wireless networks
against known weaknesses
Marking
Schemes
It is advantageous if your report is
structured in a manner that reflects the allocation of marks below:
Abstract (max 100 words
(discuss scenario)) |
5 |
Introduction |
15 |
Technical flaws
- Research how to bypass WLAN authentication if SSID is hidden and if
administrators use MAC filtering. |
15 |
Technical
flaws - Research WLAN encryption flaws (WEP, WPA2). |
10 |
Technical flaws
- Research 802.11 clients and identify flaws and they can be exploited |
15 |
Choose the most
suitable security measures for your scenario and justify your choice. |
15 |
Research your chosen
security measures in order to defend your choices. |
10 |
Conclusion |
10 |
References |
5 |
Appendix (if needed) |
|
Instruction
Your
work must be presented in the form of a short technical paper and be no longer than
7 sides plus a facing
page that includes
the abstract. This should be formatted for A4
page size and use a font size no smaller than
10.
Any work beyond the page limit will
be ignored from a marking perspective. For completeness, you may if you wish
include additional material in an appendix, e.g. screenshots of all your
experiments, but this will not contribute to the marks and you should not
explicitly refer to any appendix to illustrate results etc. You could use an
appendix to show all screenshots of all labs.
0 comments:
Post a Comment