Discuss wireless technology including wireless protocols


 Discuss wireless technology including wireless protocols, wireless devices, and wireless security.

 Explain various types of wireless attacks and methods to mitigate these attacks.

 Examine appropriate control mechanisms to secure data in virtualized environments and on the cloud.

Course outcome:

IT286-3: Explain the protection of wireless networks and cloud services, and the hardening of hosts and
applications.
Instructions:
NOTE: You will have two parts to the Assignment in this unit that will be submitted as one file through the
Dropbox.
Requirements:
Unit Assignments include short essay, descriptive tables and screen captures demonstrating an understanding of the topics. Any resource used including the textbook should be properly cited.Documents should be submitted using APA Style (double-spaced with a title page and a reference page).Essays should be separated into sections by the Assignment Part number and the question number.

Part 1

1. Create a table comparing WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2

Standard Definition Algorithm Suggested Use

2. In a short essay, describe Temporal Key Integrity Protocol (TKIP). What is it based on? What does it do?

3. You are asked to secure a wireless network by making sure only authorized computers connect. What can

you do to accomplish this? Give an example.

4. Review Table 5.1 in your text that lists six different types of wireless attacks and matches an analogy of

each attack. Do some research on these attacks and create a table of your findings.

Attack Name Definition Result

5. In a short essay, define the three cloud computing service models.

6. In a short essay, examine the cloud computing delivery models. Give a scenario for each.

7. The following five topics describe important concepts for virtualizations: Snapshots, Patch Compatibility,

Host Availability/Elasticity, Security Control Testing (SCT) and Sandboxing. Briefly define each of these and

explain why it can be a security concern.

 

Part 2

1. Connect a wireless network on a Windows system

View the video on wireless connections before doing this lab.

To set up a new wireless connection, select Set up a new network from the Network and Sharing Center
window.

To enable an automatic wireless network configuration, select the wizard.

To manually connect to a wireless network, select the Manually create a network profile.

To connect to an existing wireless network under Available networks, select the network name and then
Configure. In Wireless Network Properties, specify the wireless network settings and specify the networkname SSID (Service Set Identifier). Using only the SSID is not secure. Take a screen capture of the settings.

2. Wireless Capture Tools

Note: Be cautious when downloading any software tool from insecure websites.

Review a wireless packet sniffer tool (see suggestions below) and provide a brief description. Take a screen
capture of the output data from the tool as shown on the wireless packet sniffer website (if not available, showfeatures).
Suggestions:

Aircrack-ng - a set of tools for auditing wireless networks

NetStumbler - wardriving to find open wireless access points

InSSIDer - signal strength and access point finder, etc.3. Platform as a Service
Review a Platform as a Service (PaaS) vendor (Ex: Salesforce.com or Amazon Web Services) and describe
how the client interacts with the cloud using this service. Outline several of the features of the platform and take a screen capture of the vendor's marketing site and graphics. Review the grading rubric below before beginning this activity:

Request for Solution File

Ask an Expert for Answer!!
Marketing Management: Discuss wireless technology including wireless protocols
Reference No:- TGS01058811

Expected delivery within 24 Hours