Wireless Security – Designing


This assignment has two parts. You must
undertake all two parts and submit the parts together in a single file.  

  • PART A

part is worth 50%.

WLAN design and implementation need proper
management and technical considerations within an organisation. It is critical
to developing a WLAN security policy that supports the long term organisational
goal in governing WLAN technologies and operations.

You are required to develop a WLAN security
policy for a virtual bank that has 100 employees across its 10 branches in a
city. The number of wireless clients, including the customers’ devices, cannot
exceed 50 nodes per branch per day.

The following template heading structure should
be used for your submission. 


  • Overview
    of WLAN security
  • Security
    components that are required for a strong WLAN security
  • Trade-offs
    in WLAN security policy
  • Scope
  • Where
    is it applied?
  • Applicable
  • Premises
  • WLAN
  • Policy
  • General
  • Why
    policy needed?
  • Who
    implements the policy?
  • Audience
    of the policy
  • Potential
    WLAN security risks and financial impacts if compromised
  • Auditing
  • Policy
    enforcement (Who enforces it? Actions taken for violations)
  • Functional
  • Essentials
    such as password policies, etc
  • WLAN
    security practices such as configuration checklist, testing procedures, etc
  • What
    authentication, encryption, etc should be in place?
  • Attack
    detection and alarming
  • Government
    and industry regulations (Australia)
  • Mandated
    regulations by gov and industries
  • Policy
  • Remote
    Access WLAN Policy
  • Rogue
    AP Policy
  • Wireless
    LAN Proper Use Policy
  • WIDS
  • Guest
    Access Policy
  • BYOD
  • PART B

     This part is worth 50%.

E-health hospital provides online healthcare
service for patients. The employees of the hospital such as doctors, nurses and
others use Wi-Fi in order to access patient and examination information. The
main area of concern for risk analysis is the patient database server and the
medicine database server keeping track of the patient and the medical
information, respectively. The important security requirements are the
availability of databases to employees and patients, and the confidentiality of
patient information.

Assuming CORAS approach of risk analysis,
identify and model:

  • Using
    Asset, Threat, Risk, Treatment, and Treatment Overview diagrams
  • Using
    the steps of risk analysis in CORAS framework
  • Set
    scope and focus
  • Describe
    the target (goals of analysis, target in use, customer’s view of the target)
  • Understand
    assets and parties with their relationships (Asset diagram), and high-level
    analysisà rough list of unwanted incidents, threats, vulnerabilities, threat
  • Rank
    assets, scale of risks, risk function and risk evaluation metrics
  • Risk
    identification and estimation using Threat diagram (refine step c)
  • Risk
    evaluation using risk diagram (acceptable risks for further evaluation for
  • Risk
    treatment using treatment diagram

The post Wireless Security – Designing appeared first on My private mentor.


Source link

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp