Assignment Description
Assignment Overview
Your tutor will allocate one of the scenarios to you. Use the allocated scenario and identify a tool suitable for the selected scenario by doing a minor research online specific for that scenario. Confirm with your Tutor that no other peer student has already selected that tool. Note: There may be multiple tools suitable for the scenarios below; you should use the most suitable tool for the selected scenario. Prepare a technical report according to the specification below. You report should include the following:
1. Test the tool and report one technique (such as WLAN discovery, penetration testing, vulnerability assessment, etc) to secure and/or manage WLAN in an enterprise setting. your report should:
a. Categorize the tool (WLAN Analysis, Exploitation and Stress Testing tools) and the technique (WLAN discovery, penetration testing, vulnerability assessment, etc)
b. Include screenshots (as an evidence that you actually implemented the technique) and detail explanation to report working mechanism (the step by step process) of the identified technique.
c. Explain the use (evaluation) of this techniques to secure and/or manage WLAN.
2. Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video). Your video file format must be compatible with video playing software available in MIT labs. Failure to submit the video (using Moodle submission link) will result a failing grade.
Plagiarism
All used sources must be properly acknowledged with references and citations, if you did not create it. Quotations and paraphrasing are allowed but the sources must be acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism is failure for the assignment. The act of giving your assignment to another student is classified as a plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as you have not contributed to the report.
Scenario 1:
You are to create a small Wireless LAN for your office in a building in which there are several other offices that may have WLANs. Your mission is to identify a tool to avoid co-channel and overlapping interference by WLAN discovery to locate any neighboring wireless networks and if they may impact your own WLAN.
Scenario 2:
You are hired as a consultant to place a Wi-Fi network for which you need to carry out Wi-Fi scanning, to notify you of all the nearest and closest Access points AP’Ss, as well as identify if the networks are 802.11/a, 802.11/b, 802.11/g. Also, its main features should include AP information (SSID, MAC Address) and signal quality chart.
Scenario 3:
You are travelling on a business trip and are staying in a hotel. But the hotel allows you only one Wi-Fi connection. As a result you need to create a hotspot on your laptop in order to let the rest of your devices connect to the hotel’s WLAN. You need to use a software tool that has features that need to be set up in order to have a hotspot such as the, name of the spot, password of the connection etc.
Scenario 4:
As a Wi-Fi consultant you have to set up a WLAN for an enterprise that requires you to use a tool that can do the following tasks such as discovering Wi-Fi networks, Troubleshooting the connectivity issues of Wi-Fi, Verifying Wi-Fi coverage, Managing a laptop’s Wi-Fi connection and Detecting rogue APs.
Scenario 5:
You are a Road warrior (salesman) frequently travelling around the world. You need a free sniffing tool which helps you to locate available wireless hot spots anywhere in the world and it should provide a technique of automatically connecting to available wireless hotspots wherever you travel. It may also offer a feature to locate your friends wherever they are and chat with online friends.
Scenario 6:
As a security analyst you need to have a Linux based tool for use in testing and discovering flaws in one’s own network with the aim of fixing the flaws detected.
Scenario 7
As a security analyst you need to have tool that gives detailed information about the surrounding Wi-Fi networks such as SSID, the kind of network security used etc but it should also be able to provide information on surrounding WPANs such as Bluetooth. It should also be used on Mac OS.
Scenario 8
You need to have a tool that will provide detailed information about networks and its security measures to make sure that the network will be kept secure. It should also give you give information about the signal to noise ratio which is important to process and get access to the network. It should also help you to find out your Wi-Fi extent range.
Scenario 9
You are installing a Wi-Fi network for which you need a network discovery tool that gathers information about nearby wireless access points in real time. It should also have features such as: Generating reports in Adobe PDF format that include the list of access points and their properties, Powerful and innovative logging and recording capability. Reviewing recorded data a snap. Support for multiple installed wireless adapters installed- option to select the adapter that you need.
Marking aspects:
Marks are allocated as indicated on each question, taking the following aspects into account:
Aspects
|
Description
|
Evaluation
|
Explain the use of the technique
|
Explanation
|
Description/explain how to use the technique
|
Report structure
|
Inadequate structure, careless presentation, poor writing
|
Reference style (IEEE)
|
Proper referencing if required
|
Video along with audio demonstration
|
Successful video demonstration to support submitted report.
|
Plagiarism
|
Copy from another student, copy from internet source/textbook, copy from other sources without proper acknowledgement
|
Marking Rubric for Exercise Answers
Grade
Mark
|
HD
80%+
|
D
70%-79%
|
CR
60%-69%
|
P
50%-59%
|
Fail
< 50%
|
|
Excellent
|
Very Good
|
Good
|
Satisfactory
|
Unsatisfactory
|
Evaluation
/3
|
Logic is clear and easy to follow with strong arguments
|
Consistency logical and convincing
|
Mostly consistent and convincing
|
Adequate cohesion and conviction
|
Argument is confused and disjointed
|
Sophistication and effectivity
/3
|
The presented solution demonstrated an extreme degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated a high degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated an average degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated a low degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated a poor degree of sophistication and effectivity to secure and/or manage WLAN.
|
Explanation
/5
|
All elements are present and well integrated.
|
Components present with good cohesion
|
Components present and mostly well integrated
|
Most components present
|
Lacks structure.
|
Reference style
/1
|
Clear styles with excellent source of references.
|
Clear referencing/ style
|
Generally good referencing/style
|
Unclear referencing/style
|
Lacks consistency with many errors
|
Report structure and report presentation
/5
|
Proper writing. Professionally presented
|
Properly written, with some minor deficiencies
|
Mostly good, but some structure or presentation problems
|
Acceptable presentation
|
Poor structure, careless presentation
|
Video of Demonstration
/3
|
Successful completion and well understanding of the outcome.
|
Successful completion and understanding of the outcome.
|
Partially completed and partially understanding of the outcome.
|
Partially completed and did not understanding of the outcome.
|
Not completed and did not understanding of the outcome.
|