Assessment Details and Submission Guidelines Unit Code BN303 Unit Title Wireless Network & Security Assessment Type Individual Assessment Assessment Title Use of a WLAN Tools in an enterprise setting Purpose of the assessment (with ULO Mapping) a) Demonstrate a deep understanding of wireless architecture and security vulnerabilities using examples and appropriate explanations. Weight 20% Total Marks 20 Word limit 1500 Due Date Week 7 Sunday i.e. 7th of May 2017 Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension • If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct • Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.   Assessment Cover Sheet Student ID: Student Surname: Given Name: Course: School: Unit Code: Unit Title: Due Date: Date Submitted: Campus: Lecturer: Tutor: All work must be submitted on Moodle by the due date. If an extension of time to submit work is required, a Special Consideration Application must be submitted. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information please refer to the Academic Integrity Section in your Unit Description. Student Declaration I/We declare that:  the work contained in this assignment is my/our own work/group work, except where acknowledgement of sources is made;  certify that this assessment has not been submitted previously for academic credit in this or any other course;  I/we have read the MIT’s Plagiarism and Academic Misconduct Policy Procedure, and I/we understand the consequences of engaging in plagiarism;  a copy of the original assignment is retained by me/us and that I/we may be required to submit the original assignment to the Lecturer and/or Unit Co-ordinator upon request; I/we have not plagiarised the work of others or participated in unauthorised collaboration when preparing this assignment. Student Signature: Date: Student Name: Assignment Description Assignment Overview Select a scenario from the list. Use the selected scenario and identify a tool suitable for the selected scenario by doing a minor research online specific for that scenario. Note: There may be multiple tools suitable for the scenarios below; you should use the most suitable tool for the selected scenario. Prepare a technical report according to the specification below. You report should include the following: 1. Test the tool and report one technique (such as WLAN discovery, penetration testing, vulnerability assessment, etc) to secure and/or manage WLAN. Your report should: a. Categorize the tool (WLAN Analysis, Exploitation and Stress Testing tools) and the technique (WLAN discovery, penetration testing, vulnerability assessment, etc) b. Include screenshots (as an evidence that you actually implemented the technique) and detail explanation to report working mechanism (the step by step process) of the identified technique. c. Explain the use (evaluation) of this techniques to secure and/or manage WLAN. 2. Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video). Your video file format must be compatible with video playing software available in MIT labs. Failure to submit the video (using Moodle submission link) will result a failing grade. Plagiarism All used sources must be properly acknowledged with references and citations, if you did not create it. Quotations and paraphrasing are allowed but the sources must be acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism is failure for the assignment. The act of giving your assignment to another student is classified as a plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as you have not contributed to the report.   Scenario 1 You need to have a tool that will provide detailed information about networks and its security measures to make sure that the network will be kept secure. It should also give you give information about the signal to noise ratio which is important to process and get access to the network. It should also help you to find out your Wi-Fi extent range. Scenario 2 You are installing a Wi-Fi network for which you need a network discovery tool that gathers information about nearby wireless access points in real time. It should also have features such as: Generating reports in Adobe PDF format that include the list of access points and their properties, Powerful and innovative logging and recording capability. Reviewing recorded data a snap. Support for multiple installed wireless adapters installed- option to select the adapter that you need. Late submission of assignments will be penalised as follows: • For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day. • For assignments more than 5 days late, a penalty of 100% will apply. Your submission must be compatible with the software (PDF/Word) in MIT, Computer Laboratories/Classrooms. Extensions: Under normal circumstances extensions will not be granted. In case of extenuating circumstances—such as illness—a Special Consideration form, accompanied by supporting documentation, must be received before 3 working days from the due date. If granted, an extension will be only granted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only. Accordingly the student must submit within that time limit. Penalties may apply for late submission without an approved extension. Penalties: Academic misconduct such as cheating and plagiarism incur penalties ranging from a zero result to program exclusion.   Marking aspects: Marks are allocated as indicated on each question, taking the following aspects into account: Aspects Description Marks Evaluation Explain the use of the technique 05 Explanation Description/explain how to use the technique 05 Report structure Inadequate structure, careless presentation, poor writing 04 Reference style (IEEE) Proper referencing if required 02 Video along with audio demonstration Successful video demonstration to support submitted report. 04 Marking Rubric for Exercise Answers Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail < 50% Excellent Very Good Good Satisfactory Unsatisfactory Evaluation /3 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent and convincing Adequate cohesion and conviction Argument is confused and disjointed Sophistication and effectivity /2 The presented solution demonstrated an extreme degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated a high degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated an average degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated a low degree of sophistication and effectivity to secure and/or manage WLAN The presented solution demonstrated a poor degree of sophistication and effectivity to secure and/or manage WLAN. Explanation /5 All elements are present and well integrated. Components present with good cohesion Components present and mostly well integrated Most components present Lacks structure. Reference style /2 Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors Report structure and report presentation /4 Proper writing. Professionally presented Properly written, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation Video of Demonstration /4 Successful completion and well understanding of the outcome. Successful completion and understanding of the outcome. Partially completed and partially understanding of the outcome. Partially completed and did not understanding of the outcome. Not completed and did not understanding of the outcome.