This assignment has two parts. You must
undertake all two parts and submit the parts together in a single file.
part is worth 50%.
WLAN design and implementation need proper
management and technical considerations within an organisation. It is critical
to developing a WLAN security policy that supports the long term organisational
goal in governing WLAN technologies and operations.
You are required to develop a WLAN security
policy for a virtual bank that has 100 employees across its 10 branches in a
city. The number of wireless clients, including the customers’ devices, cannot
exceed 50 nodes per branch per day.
The following template heading structure should
be used for your submission.
of WLAN security
components that are required for a strong WLAN security
in WLAN security policy
is it applied?
implements the policy?
of the policy
WLAN security risks and financial impacts if compromised
enforcement (Who enforces it? Actions taken for violations)
such as password policies, etc
security practices such as configuration checklist, testing procedures, etc
authentication, encryption, etc should be in place?
detection and alarming
and industry regulations (Australia)
regulations by gov and industries
Access WLAN Policy
LAN Proper Use Policy
- PART B
This part is worth 50%.
E-health hospital provides online healthcare
service for patients. The employees of the hospital such as doctors, nurses and
others use Wi-Fi in order to access patient and examination information. The
main area of concern for risk analysis is the patient database server and the
medicine database server keeping track of the patient and the medical
information, respectively. The important security requirements are the
availability of databases to employees and patients, and the confidentiality of
Assuming CORAS approach of risk analysis,
identify and model:
Asset, Threat, Risk, Treatment, and Treatment Overview diagrams
the steps of risk analysis in CORAS framework
scope and focus
the target (goals of analysis, target in use, customer’s view of the target)
assets and parties with their relationships (Asset diagram), and high-level
analysisà rough list of unwanted incidents, threats, vulnerabilities, threat
assets, scale of risks, risk function and risk evaluation metrics
identification and estimation using Threat diagram (refine step c)
evaluation using risk diagram (acceptable risks for further evaluation for
treatment using treatment diagram
The post Wireless Security – Designing appeared first on My private mentor.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"