You are on page 1of 12

CYB 360 Week 1 Wireless Network Needs and

Requirement
For more course tutorials visit

www.tutorialrank.com

Write a 1- to 2-page report for the Director of IT describing the


requirements you are considering as your team implements the wireless
network. Include the following:

Design requirements that must be addressed

Justification to use different frequencies, channels, and antennae in the


installation

Regulatory requirements to consider in implementation

Security requirements

Create a 1/2- to 1-page table for your team. In the table, summarize
possible frequency choices, including an explanation of the strength and
weakness of each.
.....................................................................................................................
.........................................

CYB 360 Week 2 Wireless Site Survey


For more course tutorials visit

www.tutorialrank.com
Perform a basic assessment of a familiar environment (e.g., your home,
work, or a local business). Identify the following:

· Your goal (e.g., provide wireless coverage for a two-story house with
two desktop computers and a printer)

· Possible sources of interference

· Existing wireless infrastructure

· Potential access point placement

· Potential antenna placement

· Potential equipment and supporting equipment

Note: You may provide photographs to support the site survey.

Based on your visual inspection of the site, create a 1- to 2-page site


survey. Provide your conclusions from your assessment and detail the
following:
· Methods of gathering information

· Information gathered

· Possible sources of interference

· Existing wireless infrastructure

· Recommendations for access point and antenna placement

· Recommendations for equipment and supporting equipment

No plagiarism. APA format

.....................................................................................................................
.........................................

CYB 360 Week 3 Configuring a Secure Wireless Network


Part 1
For more course tutorials visit
www.tutorialrank.com

Your office has implemented a WLAN and needs you to configure the
WLAN environment with three Cisco Meraki™ MR62 wireless access
points (WAPs) in order to access the Internet and intercommunicate.
Security is not overly important at this time.

WAP Placement:

The Visio® diagram provided, "Office Wireless Network," shows the


placement of each WAP within the building.

Firewall:

The firewall is located in the Data Center.

IP Information:

The organization has an external IP address of 23.4.178.126 and uses


private IPv4 space on the 10 network. The IP space for internal routers
and access points is 10.0.1.x with all IPs available above 10.0.1.10.
Before working on this assignment, research the wireless access pointon
the Cisco Meraki™ documentation site.

Using the information from the Cisco Meraki™ site, document the
configuration value to implement each device in the "WLAN
Configuration Design Template" to allow all networked computers to
communicate with each other and the Internet.

Complete the 1-page "WLAN Configuration Design Template"


spreadsheet.

Create 1- to 2-page diagram depicting the process you took to identify


the appropriate configuration settings for each device. Your audience is
your director, so be clear and explain the vulnerabilities that exist in the
implemented environment.

For the diagram you can use Visio®, Microsoft® Word, or


PowerPoint® or other appropriate application.

.....................................................................................................................
.........................................

CYB 360 Week 3 Team Technical Specification


Document
For more course tutorials visit

www.tutorialrank.com
CYB 360 Week 3 Team Technical Specification Document

.....................................................................................................................
.........................................

CYB 360 Week 4 Configuring a Secure Wireless Network


Part 2
For more course tutorials visit

www.tutorialrank.com

An unsecured network poses risk of internal and external compromises.


Users in human resources typically transmit sensitive information across
the network. The network should encrypt HR data in transit.

Using the configurations and topology you added to the "WLAN


Configuration Design Template" in Week Three, add security and
segregate internal traffic.

Secure the network to:

Minimize the risk of intrusions

Identify attempted intrusions

Limit visibility of HR traffic on the network


Modify the "WLAN Configuration Design Template" to include:

Configuration changes to the existing devices

Introduction of other devices required to meet security objectives

Create a 10- to 12-slide PowerPoint® presentation for management to


explain from a security standpoint the changes you will make and the
reasons for those changes. Include the following in the presentation:

Describe basic security concerns as they relate to wireless networks.

Assess the security vulnerabilities, including active protocols, to the


unsecured network.

Describe your selection of devices added to the network and their role in
meeting the security needs of the network to include a justification of the
WIPS or WIDS and encryption method selection.

Determine how new devices changed the network design and affected
configuration settings to include sensors used to monitor the network.

Provide a rationale for all of your choices.

Note: Other applications like Adobe® Spark or Microsoft® Sway® or


Mix can be used instead of PowerPoint®. The presentation should be
"media-rich," it should include voice-overs, graphics, interaction, and
other techniques to create a dynamic multimedia presentation.

Be sure to include supporting images and appropriate backgrounds and


styles. All references must be attributed, cited appropriately throughout
the document, and adhere to APA guidelines. Images should not be
copied unless the author permission is obtained or copyright-free images
are used.

.....................................................................................................................
.........................................

CYB 360 Week 4 Team Encryption and WIPS/WIDS


Implementation
For more course tutorials visit

www.tutorialrank.com

This week your team is presenting recommendations to your director on


implementing, securing, and monitoring the network for data security
assurance.

Create a 6- to 8-slide PowerPoint® presentation for your director. The


presentation should include:

Recommended encryption type


Recommended Wireless Intrusion Prevention System (WIPS) and
Wireless Intrusion Detection System (WIDS) deployed and where

Summary of key security features to deploy

Any other appropriate recommendations

Note: Other applications like Adobe® Spark or Microsoft® Sway® or


Mix can be used instead of PowerPoint®.
Be sure to include supportive graphics and appropriate backgrounds and
styles. All references must be attributed, cited appropriately throughout
the document, and adhere to APA guidelines. Images should not be
copied unless author permission is obtained or copyright free images are
used.

.....................................................................................................................
.........................................

CYB 360 Week 5 Attack Vectors and Wireless Network


Hardening
For more course tutorials visit

www.tutorialrank.com

This week you are reporting possible security threats to your network,
how the network is hardened against such threats, and recommendations
to harden the network further.

As a team, discuss likely threats against the network and decide on


recommendations to harden the network.

Create a 1-page table listing possible security threats. Include attack


vectors, how this network has been hardened against such attacks, and/or
recommendations for further steps to take.
Combine documents from this and previous weeks:

Week 2: IPP HQ Layout

Week 3: Technical Specifications Document

Week 4: Encryption and WIPS/WIDS Implementation PowerPoint®

Include corrections and recommendations based on changes made to the


wireless network and instructor feedback.

.....................................................................................................................
.........................................

CYB 360 Week 5 Packet Capture Analysis


For more course tutorials visit

www.tutorialrank.com

You are analyzing packet captures from a wireless network to assess if


the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark


by doing the following:

Go to the Wireshark Sample Captures site, and download the following:


· wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic

· wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample

· nb6-hotspot.pcap Someone connecting to SFR's wireless community


network

· ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control


Protocol (WLCCP) version 0x0

· wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off
your computer's system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1-page table that ranks the packet captures from the highest to
lowest threat. In your table provide the following for each packet
capture:

· Description of the traffic


· Description of the risks, if any, the traffic poses to the wireless network

· Countermeasures to take to secure network from any threat

Write a 1/2- to 1-page memo to management as a network security


specialist explaining the following:

· How you can distinguish hostile packet data from normal packet data

· How you can recognize any attack signatures in the packets you
analyze

· Provide a rationale for ranking the packets as you did

You might also like