Professional Documents
Culture Documents
Requirement
For more course tutorials visit
www.tutorialrank.com
Security requirements
Create a 1/2- to 1-page table for your team. In the table, summarize
possible frequency choices, including an explanation of the strength and
weakness of each.
.....................................................................................................................
.........................................
www.tutorialrank.com
Perform a basic assessment of a familiar environment (e.g., your home,
work, or a local business). Identify the following:
· Your goal (e.g., provide wireless coverage for a two-story house with
two desktop computers and a printer)
· Information gathered
.....................................................................................................................
.........................................
Your office has implemented a WLAN and needs you to configure the
WLAN environment with three Cisco Meraki™ MR62 wireless access
points (WAPs) in order to access the Internet and intercommunicate.
Security is not overly important at this time.
WAP Placement:
Firewall:
IP Information:
Using the information from the Cisco Meraki™ site, document the
configuration value to implement each device in the "WLAN
Configuration Design Template" to allow all networked computers to
communicate with each other and the Internet.
.....................................................................................................................
.........................................
www.tutorialrank.com
CYB 360 Week 3 Team Technical Specification Document
.....................................................................................................................
.........................................
www.tutorialrank.com
Describe your selection of devices added to the network and their role in
meeting the security needs of the network to include a justification of the
WIPS or WIDS and encryption method selection.
Determine how new devices changed the network design and affected
configuration settings to include sensors used to monitor the network.
.....................................................................................................................
.........................................
www.tutorialrank.com
.....................................................................................................................
.........................................
www.tutorialrank.com
This week you are reporting possible security threats to your network,
how the network is hardened against such threats, and recommendations
to harden the network further.
.....................................................................................................................
.........................................
www.tutorialrank.com
Note: Only download these sample captures. Other captures may set off
your computer's system defenses.
Create a 1-page table that ranks the packet captures from the highest to
lowest threat. In your table provide the following for each packet
capture:
· How you can distinguish hostile packet data from normal packet data
· How you can recognize any attack signatures in the packets you
analyze