Demonstrate a deep understanding of wireless architecture


Use of a WLAN Tools in an enterprise setting

a) Demonstrate a deep understanding of wireless architecture and security vulnerabilities using examples and appropriate explanations.

Assignment Overview

Select a scenario from the list. Use the selected scenario and identify a toolsuitable for the selected scenario by doing a minor research online specific for that scenario. Note: There may be multiple tools suitable for the scenarios below; you should use the most suitable tool for the selected scenario. Prepare a technical report according to the specification below. You report should include the following:

1. Test the tool and report one technique (such as WLAN discovery, penetration testing, vulnerability assessment, etc) to secure and/or manage WLAN.Your report should:

a. Categorize the tool (WLAN Analysis, Exploitation and Stress Testing tools) and the technique (WLAN discovery, penetration testing, vulnerability assessment, etc)

b. Include screenshots (as an evidence that you actually implemented the technique) and detail explanation to report working mechanism (the step by step process) of the identified technique.

c. Explain the use (evaluation) of this techniques to secure and/or manage WLAN.

2. Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video).Your video file format must be compatible with video playing software available in MIT labs. Failure to submit the video (using Moodle submission link) will result a failing grade.

Scenario 1

You need to have a tool that will provide detailed information about networks and its security measures to make sure that the network will be kept secure. It should also give you give information about the signal to noise ratio which is important to process and get access to the network. It should also help you to find out your Wi-Fi extent range.

Scenario 2

You are installing a Wi-Fi network for which you need a network discovery tool that gathers information about nearby wireless access points in real time. It should also have features such as: Generating reports in Adobe PDF format that include the list of access points and their properties, Powerful and innovative logging and recording capability. Reviewing recorded data a snap. Support for multiple installed wireless adapters installed- option to select the adapter that you need.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Demonstrate a deep understanding of wireless architecture
Reference No:- TGS02276889

Now Priced at $40 (50% Discount)

Recommended (97%)

Rated (4.9/5)