Project Introduction: • Introduce your team and your role in this project
Scope and timeline: • Stockholder analysis • Explain how your network design and the services provided will Increase the revenue (must be in detail; not Just ‘cut and paste” • In Scope and Out of Scope • Project timeline (need to explain why such a timeline is chosen)
Design Challenges: • What are the technical challenges at each level (you can split your discussion based on labs, floor area and levels). • How these architecture challenges affect your design. This is very important aspect of your WiFi design.
Cabling standard: • Here you must specify how are you going to interconnect your APs to Switches and WLC. • You must provide a cabling schema. This must be split at floor levels, labs. Encouraged to use hierarchical design.
Traffic Characterization: • What are the potential traffic in your WiFi network (with justification) • How are going to segregate traffic? You need to explain using standardized technologies. • How it can be implemented. Traffic segmentation Is one of the Important aspect of your WiFi project.
Assignment Description You are a wireless network engineer at Melbourne Institute of Networks in Australia. Your business is to offer wireless solutions to the higher education service provider in Australia. As part of your business, you offer an initial obligation free consultation to the potential clients on the benefits and challenges of wireless communications. Your new client is Australian Business Institute of Technology and Systems and they are considering to turn their entire campus wireless – which became a necessity after COVID where the social distancing has become a norm. In this report, you are to address the use of wireless communications to support business and educational institutes in support of providing more flexibility in spacing in response to the social distancing requirement of the COVID pandemic. [Assignment 1 Part A] · Describe the potential advantages of wireless communication technologies in response to the COVID social distancing requirements. · Report potential challenges with wireless communication technologies in higher education service provider (university) environments with labs, walls and many electrical gadgets. [Assignment 1 Part B] Your client wants to know about the available wireless technologies to support their continued business during and after the pandemic. Your task is to select at least two of the following wireless technologies in relevance to the case scenario above: · Wi-Fi · ZigBee · Bluetooth · RFID · IoT · WiGi · 5G-6G You can advise your client on: 1.1 Rationale to select particular technologies 1.2 Extended discussion of the selected technologies with successful business case example(s) 2. Technical report and comparative analysis on the working mechanism of the selected technologies 3. Business benefits of the selected technologies 4. Security concerns of the selected technologies 5. The final recommendation to the business.
Objectives The assessment item 1 is designed to test your understanding of information security including the background of information security, basic and advanced cryptography, public key infrastructure and cryptographic transport protocols related to the contents in weeks 1-5. Assessment task Assessment 1 task contains a series of short-answer questions related to the contents in weeks 1-5. How to complete the tasks For short-answer questions, a template will be provided, and the answers will be assessed regarding accuracy, clarity and detail. Please note: • Use the provided templates to insert your responses for each question. • You should submit the completed templates online. • Use your own words to answer the questions. • All external material should be properly paraphrased and referenced according to Harvard Style. • Plagiarism detection will be use in these assignments. • All academic misconduct cases will be raised as per the university policy. Please go through the University Academic Misconduct policy very carefully before you submit your paper and make sure your submission is free from all academic misconduct issues. • Late penalties will be applied (5% of the total scores per day late).
Short-answer questions are as follows: Question 1: Answer the following questions regarding information security. a) Defenses against security attacks should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. Select one of the recent attacks as discussed in the lecture or search on the Internet and provide answers for the following questions related to that. i. Explain the security attack briefly (please provide reference for the source of the information). ii. How could the attack be prevented if the five fundamental security principles had been applied? Explain how each of the them could have been used to mitigate the attack. b) Insider attacks caused by employees, contractors and other trusted parties are more difficult to defend than external attacks in an organisation. Explain and justify this statement with an example. Question 2 Answer the following questions regarding different types of security attacks. a) Malicious software, or malware, is a software that enters a computer system without the owner’s knowledge or consent and could damage a system. Viruses and worms are two types of malware that could attack a system. i. Explain the differences between viruses and worms in terms of the actions they perform and how they spread into the system. ii. What is your recommended defense mechanism against virus and worms for any organisation? b) Detecting phishing emails can often be difficult. Do some research on ways to detect phishing emails and write a summary on what you have learned about the ways of detection of phishing emails. Question 3 Answer the following questions on basic cryptography and server attack. a) Hashing is a process for creating a unique digital fingerprint for a set of data. This fingerprint is called a digest or hash. There are different types of hashing algorithms. Research any three types of hash algorithms discussed in the lecture material, and then create a table that compares them. Your comparison may include the size of the digest, the number of rounds needed to create the hash, security, speed, strengths and weaknesses of the algorithms.
b) Explain with an example how a Denial of Service (DoS) attack prevents authorized users from accessing a system. What are the prevention strategies for DoS/DDoS attacks? Question 4: Cryptography is used to secure data-in-transit, data-at-rest and data-in-use. Answer the following question on Cryptography. a) Explain the advantage and disadvantage of symmetric encryption algorithms and how to compensate the disadvantage. b) Cryptography can be applied through software and hardware (referred as software and hardware encryption). i. Analyse and explain the advantage/s and disadvantage/s of software and hardware encryption. ii. Trusted Platform Module (TPM) is considered as one of the sophisticated hardware encryption option. Explain in your own words how data security is ensured using TPM. Question 5: Answer the following questions on advanced cryptography and cryptographic transport protocols. a) Answer the following questions regarding digital signature and digital certificate. i. XYZ is a financial service provider that provide different types of financial services to its customers. XYZ uses digital signature for all electronic correspondence, both internal between employees and external to all customers for ensuring the identity of the sender. But the newly appointed IT security manager wants to implement a more secure system as he believes that “digital signature does not always confirm the true identity of the sender of a message”. Assume an employee of XYZ wants to send a message with business invoice to another employee who works remotely. Explain with a diagram how an attacker could intercept the message and imposter public key in the given scenario. You may make assumption as required to answer this question, but it needs to be aligned with this case scenario and you need to clearly mention the assumption/s taken. ii. Explain the concept behind digital certificate and how it could ensure the identity of the sender of a message. b) Secure Socket Layer (SSL) is one of the most common cryptographic transport protocols. Explain how SSL works and how it can be used with other technologies or protocols to enhance the web server security.
In this assessment you are required to explore the given case study and provide a solution, employing the latest wireless communication techniques. The
solution needs to be presented in a report and a short video presentation discussing findings and the proposed solution. The assessment will help in
developing an understanding of communication in wireless networks and the limitations and challenges.
Case Study: Home office
Under doctor’s orders for more bed rest, Jan received authorization from her employer to work from home during and immediately after her pregnancy.
However, to do her job effectively, she routinely needs to retrieve large files from the corporate local area network (LAN), modify them, and return them to
another location on the LAN. She also occasionally likes to print something for convenience or record keeping, and she needs convenient access to a telephone.
Jan has received instructions from her company’s Information Technology (IT) staff regarding how to connect to the corporate LAN.
Jan currently has broadband access to her home. However, the only access is to a PC in a family room in the home’s finished basement. Jan’s family uses this
PC for Internet access, online gaming, and as a resource for school projects. The PC is connected to a colour printer. Jan wants to create a home office in an
unused upstairs bedroom. During the later stages of her pregnancy, she wants the convenience of working from more comfortable locations, such as her
couch or bed. She already has a cordless phone and is planning to purchase a laptop PC and perhaps a second printer. However, a quick call to her broadband
provider has caused her to question the financial feasibility of running new wiring for broadband access in other locations of her home. Perplexed with her
problem, Jan talks to some of her co-workers, and one of them mentions wireless. Jan does a little investigation of the wireless LAN products available and
decides many of the products are within her budget.