1 / 13

CYB 360 Education for Service--tutorialrank.com

For more course tutorials visit<br>www.tutorialrank.com<br><br>Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following: <br><br>Design requirements that must be addressed <br>Justification to use different frequencies, channels, and antennae in the installation <br>Regulatory requirements to consider in implementation<br>Security requirements<br>

Download Presentation

CYB 360 Education for Service--tutorialrank.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYB 360 Week 1 Wireless Network Needs and Requirement For more course tutorials visit www.tutorialrank.com Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following: Design requirements that must be addressed Justification to use different frequencies, channels, and antennae in the installation Regulatory requirements to consider in implementation Security requirements Create a 1/2- to 1-page table for your team. In the table, summarize possible frequency choices, including an explanation of the strength and weakness of each. ============================================== CYB 360 Week 2 Wireless Site Survey

  2. For more course tutorials visit www.tutorialrank.com Perform a basic assessment of a familiar environment (e.g., your home, work, or a local business). Identify the following: · Your goal (e.g., provide wireless coverage for a two-story house with two desktop computers and a printer) · Possible sources of interference · Existing wireless infrastructure · Potential access point placement · Potential antenna placement · Potential equipment and supporting equipment

  3. Note: You may provide photographs to support the site survey. Based on your visual inspection of the site, create a 1- to 2-page site survey. Provide your conclusions from your assessment and detail the following: · Methods of gathering information · Information gathered · Possible sources of interference · Existing wireless infrastructure · Recommendations for access point and antenna placement · Recommendations for equipment and supporting equipment No plagiarism. APA format

  4. ============================================== CYB 360 Week 3 Configuring a Secure Wireless Network Part 1 For more course tutorials visit www.tutorialrank.com Your office has implemented a WLAN and needs you to configure the WLAN environment with three Cisco Meraki™ MR62 wireless access points (WAPs) in order to access the Internet and intercommunicate. Security is not overly important at this time. WAP Placement: The Visio® diagram provided, "Office Wireless Network," shows the placement of each WAP within the building. Firewall: The firewall is located in the Data Center.

  5. IP Information: The organization has an external IP address of 23.4.178.126 and uses private IPv4 space on the 10 network. The IP space for internal routers and access points is 10.0.1.x with all IPs available above 10.0.1.10. Before working on this assignment, research the wireless access pointon the Cisco Meraki™ documentation site. Using the information from the Cisco Meraki™ site, document the configuration value to implement each device in the "WLAN Configuration Design Template" to allow all networked computers to communicate with each other and the Internet. Complete the 1-page "WLAN Configuration Design Template" spreadsheet. Create 1- to 2-page diagram depicting the process you took to identify the appropriate configuration settings for each device. Your audience is your director, so be clear and explain the vulnerabilities that exist in the implemented environment. For the diagram you can use Visio®, Microsoft® Word, or PowerPoint® or other appropriate application.

  6. ============================================== CYB 360 Week 3 Team Technical Specification Document For more course tutorials visit www.tutorialrank.com CYB 360 Week 3 Team Technical Specification Document ============================================== CYB 360 Week 4 Configuring a Secure Wireless Network Part 2 For more course tutorials visit www.tutorialrank.com An unsecured network poses risk of internal and external compromises. Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit.

  7. Using the configurations and topology you added to the "WLAN Configuration Design Template" in Week Three, add security and segregate internal traffic. Secure the network to: Minimize the risk of intrusions Identify attempted intrusions Limit visibility of HR traffic on the network Modify the "WLAN Configuration Design Template" to include: Configuration changes to the existing devices Introduction of other devices required to meet security objectives Create a 10- to 12-slide PowerPoint® presentation for management to explain from a security standpoint the changes you will make and the reasons for those changes. Include the following in the presentation: Describe basic security concerns as they relate to wireless networks. Assess the security vulnerabilities, including active protocols, to the unsecured network.

  8. Describe your selection of devices added to the network and their role in meeting the security needs of the network to include a justification of the WIPS or WIDS and encryption method selection. Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network. Provide a rationale for all of your choices. Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®. The presentation should be "media-rich," it should include voice-overs, graphics, interaction, and other techniques to create a dynamic multimedia presentation. Be sure to include supporting images and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Images should not be copied unless the author permission is obtained or copyright-free images are used. ============================================== CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation For more course tutorials visit

  9. www.tutorialrank.com This week your team is presenting recommendations to your director on implementing, securing, and monitoring the network for data security assurance. Create a 6- to 8-slide PowerPoint® presentation for your director. The presentation should include: Recommended encryption type Recommended Wireless Intrusion Prevention System (WIPS) and Wireless Intrusion Detection System (WIDS) deployed and where Summary of key security features to deploy Any other appropriate recommendations Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®. Be sure to include supportive graphics and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Images should not be copied unless author permission is obtained or copyright free images are used. ==============================================

  10. CYB 360 Week 5 Attack Vectors and Wireless Network Hardening For more course tutorials visit www.tutorialrank.com This week you are reporting possible security threats to your network, how the network is hardened against such threats, and recommendations to harden the network further. As a team, discuss likely threats against the network and decide on recommendations to harden the network. Create a 1-page table listing possible security threats. Include attack vectors, how this network has been hardened against such attacks, and/or recommendations for further steps to take. Combine documents from this and previous weeks: Week 2: IPP HQ Layout Week 3: Technical Specifications Document Week 4: Encryption and WIPS/WIDS Implementation PowerPoint®

  11. Include corrections and recommendations based on changes made to the wireless network and instructor feedback. ============================================== CYB 360 Week 5 Packet Capture Analysis For more course tutorials visit www.tutorialrank.com You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any. For this assignment, analyze the packet captures provided by Wireshark by doing the following: Go to the Wireshark Sample Captures site, and download the following: · wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic · wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample

  12. · nb6-hotspot.pcap Someone connecting to SFR's wireless community network · ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0 · wap_google.pcap contains two WSP request-response dialogs Note: Only download these sample captures. Other captures may set off your computer's system defenses. Use Wireshark to view and analyze the sample captures. Create a 1-page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture: · Description of the traffic · Description of the risks, if any, the traffic poses to the wireless network · Countermeasures to take to secure network from any threat

  13. Write a 1/2- to 1-page memo to management as a network security specialist explaining the following: · How you can distinguish hostile packet data from normal packet data · How you can recognize any attack signatures in the packets you analyze · Provide a rationale for ranking the packets as you did ==============================================

More Related