You are on page 1of 15

POLYTECHNIC SULTAN MIZAN ZAINAL ABIDIN

DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY

DFP40263
SECURE MOBILE COMPUTING

TOPIC CHAPTER 4
ASSESMENT PRACTICAL EXERCISE 4
1) AHMAD YUSUF FARHAN BIN AWANG
NAME 2) MUHAMMAD HIDAYAT BIN AB AZIZ
3) MUHAMAD SYAFIQ IKRAM BIN MOHAMAD TARMIZI

1) 13DDT20F2008
REG NO
2) 13DDT20F2036
3) 13DDT20F2056

PROGRAMME DDT4 S1

INSTRUCTIONS:
1. Answer ALL the questions
2. Submit the assessment on

THE ENTIRE QUESTION IS BASED ON JTMK’S QUESTION BANK APPROVED BY PROGRAMME


LEADER. SIGNATURE IS NOT REQUIRED.
INSTRUCTION: Answer all questions. You are instructed to put your name and
registration number on the top of your work. You are allowed to do this Practical
Exercise in a GROUP

ASSESSMENT MEASURED:
CLO 1: Manipulate the aspect of mobile computing, model and security principles
using mobile computing technology to develop applications. (P3, PLO3)

QUESTION:

Wireless technology has become an essential part in mobile computing. The most
popular wireless technology nowadays is Wi-Fi. We can see Wi-Fi signals (SSID)
almost everywhere, it can be at home, shopping mall, airport, classroom even at the
parking lots. In a group of 3 persons, you are required to do some research about
Wi-Fi technology. Prepare a report about your findings base on the requirement
below.

a. Explain what Wi-Fi technology is.


b. Identify and explain the security settings that can be configured to a Wi-
network.
c. List and describe 3 wireless security tools that can be used to check or assess
Wi-Fi security configuration.
d. Include relevant references (URL, books) that you refer to complete (a) (b)
(c) above.

Your group must produce a simple report using Microsoft Words and your report
must consist of these elements:

 INTRODUCTION: Describe the concept of wireless security and provide the


comparison of several wireless security technologies currently available.
 TOOLS: State and explain the tools. Screenshot must be provided to proof
your work.
 STEPS: Construct step by step how to download, install, and configure the
tools.
 OUTCOME: Display the outcome.
INTRODUCTION

a) Wi-Fi technology is a wireless technology that used to connect computers,


tablets, smartphones and other devices to the internet that can connect
worldwide and can be use to browse a lot of information. Wi-Fi is the radio
signal sent from a wireless router to a nearby device, which translates the
signal into data you can see and use. Wi-Fi network is simply an internet
connection that's shared with multiple devices in a home or business via a
wireless router. The router is connected directly to your internet modem and
acts as a hub to broadcast the internet signal to all your Wi-Fi enabled
devices. This is the way how future will gives use flexibility to stay keep in
touch with each other even they far from us. The beginning of the Wi-Fi is
from the industry that was looking for a user-friendly name to refer to some
not so user-friendly technology known as IEEE 802.11 . Wi-Fi short name is
come from Wireless Fidelity. Wi-Fi uses radio waves to transmit data from
your wireless router .

It can enabled devices like your TV, smartphone, tablet and computer.
Because they communicate with each other over airwaves, your devices and
personal information can become vulnerable to hackers, cyber-attacks and
other threats. This is especially true when you connect to a public Wi-Fi
network at places like a coffee shop or airport. When possible, it's best to
connect to a wireless network that is password-protected or a personal
hotspot. Your options for connecting wirelessly at home are growing as
mobile networks expand into the home internet realm. As with internet
service, there are advantages and disadvantages to each type of wireless
connection, such as speed and strength of signal. We've outlined a few of
them here.

b) The step that need to do as a user is to secure Wi-Fi configure to a maximum


steps security is always keep up date the router's firmware. A router's
firmware is susceptible to being hacked and very easy to infected with
viruses. While the threat of hacking can't be entirely eliminated, it can be
reduced significantly by simply keeping your firmware up to date. Mostly
every developer of the router will regularly release security patches to deal
with any vulnerabilities and add new features. Most modern routers are
automatically updated to the latest firmware. But, to be sure, we always need
to check the manufacturer website either is either already update to the
newest firmware or not. It is one of the easiest way to setting security Wi-Fi
configure to the maximum level to avoid unwanted precautions happen to the
user and avoid the virus or hacker from getting inside the connection of the
Wi-Fi.

Then, other security setting that we can easily set up is change the router's
default login and password to our own password and make sure it is not easy
password to remember to other people. If we leaving these unchanged is asking for
trouble, especially given how easy they are to change. The password and login must
be a little bit complicated or secretive to other people and only us can know the
detail of the password to avoid unwanted problem happen to our router Wi-Fi
connection such as stranger can access our Wi-Fi without our permission . To make
the password of Wi-Fi is complicated and not easily stranger can access is with when
create a password, we need to add some capital letter and number to avoid easy
phrase of password that can be guess. A strong Wi-Fi password can help prevent
unauthorized network access. In setting option ,a password, it's essential to choose
the correct WiFi security type. There are broadly two types , WEP and WPA. WEP
stands for Wired Equivalent Privacy. It is considered to be an old and outdated Wi-Fi
security type, having been replaced with WPA. If your router only supports WEP,
then it's time to get a new one. Check out our list of the best VPN routers to choose
a router that'll keep you safe. WPA stands for Wi-Fi Protection Access. WPA2 and 3
are the Wi-Fi encryption protocols you should be using. Most routers that are
available in the market support WPA-2, a secure and reliable protocol. WPA-3 is the
most up-to-date protocol and should be used if your router supports it.

Next easy step to setting security configure to Wi-Fi setting is we need always
change the router's SSID. The purpose of change SSID router number is refers to
the network's name that shows up when you're trying to connect to it. Very often, it
carries the name of the. Such SSIDs giveaway the router's brand, and possibly the
model, to any potential hacker, making her job much easier. Instead, you want to
use an SSID with no obvious correlation to its manufacturer. It's best to choose a
random name that has no linkage to your personal information. For instance, you
should
avoid SSIDs that carry your name or apartment number. The SSID, like other router
settings, can be changed by accessing the router's admin page.

c) 1) Net cut
Netcut or network Cut is an application that has a function to disconnect a
client from the internet by installing Netcut server. Use than one computer,
you can disconnect the other computers without needing to install on the
computer. In addition to disconnect the internet from the client, Netcut can
also take over the bandwidth of the computer client.

2)Wire shark
Wireshark is a data capturing program that "understands" the structure
( encapsulation) of different networking protocols. It can parse and display
the fields, along with their meanings as specified by different networking
protocols. Wireshark uses pcap to capture packets, so it can only capture
packets on the types of networks that pcap supports.

3)Net spot
NetSpot provides all professional wireless site survey features for Wi-Fi and
maps coverage of a living area, office space, buildings, etc. It provides visual
data to help analyze radio signal leaks, discover noise sources, map channel
use, optimize access point locations.
d) Source link / references

-https://www.verizon.com/articles/internet-essentials/wifi-definiton/

-https://vpnoverview.com/privacy/devices/configure-router-security-and-privacy/

-https://www.pcwdld.com/wifi-tools
TOOL

- NET CUT

NetCut is a simple and lightweight app that will scan your network for
connected computers, and it will help you retrieve the information about each
computer connected to it. It is designed to give you a clearer idea of what
computers you have hooked up to your network.
STEPS

Step 1 : Search “arcai.com” in browser search bar. Then click DOWNLOADS


menu.

Step 2 : Click Download NetCut (windows)


Step 3 : After a pop-up like this appears, Click “Start Download”.

Step 4 : Once the download is complete, Click “Open”


Step 5 : Here, you need to click Install.
Step 6: Wait until it’s done.
Step 7: Here, you just select “No, I will restart the computer later”. After that, click
‘Finish’.

Step 8 : Open net cut.


Step 9 : After opening, you will be taken to this website. This is, Interface on
net cut.
Step 10 : Here you will see, secure or unsecure WI-FI connection.
OUTCOME :
Weightage
PERFORMANCE LEVEL Score
(%)
Criteria
Excellent Great Good Moderate Poor
5 4 3 2 1
PRACTICAL SKILLS
Unable to identify
Able to identify the Able to identify the Able to identify some Able to identify some of
the requirement or
requirements with requirements with of the requirements the requirements with
1. Introduction with poor 5
very clear and very clear with a clear descriptions but need
descriptions
concise descriptions descriptions description improvement
Able to state the Able to state the Able to state the Able to state the Unable to state the
appropriate tools appropriate tools appropriate tools appropriate tools and appropriate tools
2. Tools
and explain and explain very and explain quite explain but need or without 5
excellently well  well  improvement explanation
Able to construct Able to construct Able to construct tools
Able to construct Unable to
tools very clear tools clearly with with some appropriate
3. Configuration tools very clear construct tools or
with appropriate some appropriate labels but need 5
with perfection without labels
labels labels improvement
Able to display
Able to display Able to display
Able to display appropriately clear Unable to display
4. Outcome appropriately very appropriately clear 5
outcome perfectly outcome but need the outcome
clear outcome outcome
improvement
Able to Able to
Able to demonstrate Unable to
demonstrate and demonstrate Able to demonstrate the
the outcome in the demonstrate the
5. Punctuality deliver the deliver the outcome in the given time 5
given time outcome in the
outcome before outcome just in but need improvement
appropriately given time
due date. time.
Total Score /25
PRACTICAL EXERCISE 4-SMC

You might also like