Sei sulla pagina 1di 4

CT094-3.

5-3 Wireless & Mobile Security Assignment 1


Page 1

Aims:
1. To evaluate wireless security implementation in students surroundings.
2. To analyse the technology and mechanism of a wireless security tools.

Learning objectives:
1. Explain the principles and concepts involved in wireless and mobile security.
2. Discuss and justify the design of secure wireless LAN.
3. Critically evaluate various techniques and tools that can be used to attack and defence the
wireless and mobile network

Time to complete:
Task 1: 4 hours unsupervised
Task 2: 16 hours unsupervised

Activities:
This assessment is a Group (2-3 members) assignment with 70% individual component. The total
mark reflects 100% of the total coursework component.

Task 1: Site Survey (Group: 30%)


Student will perform a wireless site survey. Student will plan and conduct research on wireless
security of various geographical areas. ONE (1) report is expected to include survey specifications,
results, diagrams and analysis. The analysis shall include factors that could affect wireless security.
The factors (but are not limited to) are to be discussed covers:
Signal jamming
Interference
Rogue Access Point
Packet snooping
Network flooding
Etc.
Warning: Wardriving is strictly prohibited. Please seek permission upon performing a site survey in
private premises.

Task 2: Vulnerability Testing (Individual: 70%)


Student group will identify and investigate problems of current interest in mobile and wireless
security research. Each group member will choose ONE (1) topic within the scope of the class
materials, develop and propose a research hypothesis, and work toward solving the problem of
interest. Broad areas of interest include (but are not limited to) the following:

Level 3

Vulnerabilities in wireless LAN infrastructure or communication security protocols


Secure hardware devices (modem, gateway, wireless router, wireless access point)
Intrusion Prevention System (IPS) capabilities
Indoor/outdoor Wi-Fi security convergence
Communication and networking vulnerabilities in ad-hoc environment.
Mitigation of active and passive network attacks
Evaluation of the site survey acquired from Task 1
Other testing

Asia Pacific University of Technology and Innovation

CT094-3.5-3 Wireless & Mobile Security Assignment 1


Page 2

Guidelines for Video and Documentation


Below are the guidelines to produce the video and documentation (Task 1 & 2).
1. Title
2. Tools/hardware description
3. Show traces of original work (machine name/date time/user name etc.)
4. Instructions and explanation of the experiment
5. Results of demonstration
6. Highlights of important steps/points
7. Video Filename is to set as [name_TP_title] format

Submission requirements
1. This is a group assignment, consisting of 2-3 members.
2. To speed up the presentation, groups are asked to record a demonstration of the tool that
they used in the task(s). Proof of identity and originality is required. The estimated time is
5+- minutes.
3. Submission due date for this assignment is: Week 13. Students are encouraged to submit
their work earlier than the due date.
4. Each team member is responsible for putting in his/her signature after checking the final
documentation.
5. Student is required to document only the completed task/sub-task(s).
6. Your report must be typed using Microsoft Word with Times New Roman font and size 12.
You need use to include a word count at the end of the report and it should be in 1.5 spaces.
7. The assessment is judged based on complexity and innovative of students work.
8. Submission of reports that are unprofessional in its outlook (dirty, disorganised, inconsistent
look, varying coloured paper and size) will not fare well when marks are allocated.
9. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper.
10. The report should have a one (1) margin all around the page as illustrated below:
1 inch

1 inch

1 inch

1 inch

1 inch

1 inch

The Typed Text

1 inch

1 inch

11. Every report must have a front cover. A transparent plastic sheet can be placed in front of the
report to protect the front cover.
12. Students work that is similar to online solutions or other groups will be raised as
plagiarism or awarded 0 marks.
13. Students are to submit a CD/DVD of the softcopy of the reports and videos.

Level 3

Asia Pacific University of Technology and Innovation

CT094-3.5-3 Wireless & Mobile Security Assignment 1


Page 3

Assessment Criteria
Team Members: _______________________________________________
024%

2549%

50
74%

75100%

Performance Criteria

Work is original

Site survey is conducted

[5] Site is described and explained


- Floor plan; building architecture; photos of actual site

[10] Survey specifications are defined


- Assumptions; studies to be included/excluded; important
highlights to be emphasized; focus of study is defined

[10] Analysis of survey results was performed in depth


- Key elements, factors are discussed; facts are supported
with relevant references; comparison of similar tests
(online, *peers and other resources); survey is according
to the specifications; traces of evidence that vulnerabilities
are existing

[5] Sample size of data is presented


- Sample of raw data collected, sample screen shots, data
collected is sufficient for the study; complexity of the
chosen site

Vulnerability testing is conducted

[10] Hypothesis
- Statements are reflecting to wireless security topics; aim
& objectives are clearly defined; statement is within the
testing scope; artefact(s) for testing are clearly defined.

[10] Selection of tools


- functions, purpose, limitation of the tools; comparisons of
other tools; number of tools (depending on functions);
screenshots of interface(software & hardware
configuration) that provide security features

[10] Test plan/specification is defined


- Testing specification/scope are defined; criteria met
hypothesis; Scope of testing reflects the objectives in
wireless security

[20] Demonstration of walkthrough


- Overview is delivered; scope of presentation;
vulnerability testing are carried out according to the
specifications; pace/speed; clarity of instructions; results
are presented; sequence/flow of presenting information

[10] Evaluation is matched with the initial specification


- reflecting to hypothesis, aim & objectives; evidences are
shown to prove the analysis; success/failure factors of
vulnerability testing are discussed

Level 3

Asia Pacific University of Technology and Innovation

Task

Task 1

Task 2

CT094-3.5-3 Wireless & Mobile Security Assignment 1


Page 4

[10] Suggested solutions and recommendations


- recommendations are achievable; time frame to
implement the suggestions is reasonable;
recommendations produce the impact to security

* If there are groups that are performing site survey on the same site. Note:
plagiarism will be raised if students work is identical.

Level 3

Asia Pacific University of Technology and Innovation

Potrebbero piacerti anche