Category Archives: CYB 360

CYB 360 Week 1 Wireless Network Needs and Requirement New

CYB 360 Week 1 Wireless Network Needs and Requirement New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-1-wireless-network-needs-and-requirement-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 1 Wireless Network Needs and Requirement New

Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following:

Design requirements that must be addressed

Justification to use different frequencies, channels, and antennae in the installation

Regulatory requirements to consider in implementation

Security requirements

Create a 1/2- to 1-page table for your team. In the table, summarize possible frequency choices, including an explanation of the strength and weakness of each.

 

CYB 360 Week 2 Wireless Site Survey New

CYB 360 Week 2 Wireless Site Survey New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-2-wireless-site-survey-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 2 Wireless Site Survey New

Perform a basic assessment of a familiar environment (e.g., your home, work, or a local business). Identify the following:

· Your goal (e.g., provide wireless coverage for a two-story house with two desktop computers and a printer)

· Possible sources of interference

 

· Existing wireless infrastructure

 

· Potential access point placement

 

· Potential antenna placement

 

· Potential equipment and supporting equipment

 

Note: You may provide photographs to support the site survey.

 

Based on your visual inspection of the site, create a 1- to 2-page site survey. Provide your conclusions from your assessment and detail the following:

 

· Methods of gathering information

 

· Information gathered

 

· Possible sources of interference

 

· Existing wireless infrastructure

 

· Recommendations for access point and antenna placement

 

· Recommendations for equipment and supporting equipment

 

No plagiarism. APA format

CYB 360 Week 3 Configuring a Secure Wireless Network Part 1 New

CYB 360 Week 3 Configuring a Secure Wireless Network Part 1 New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-3-configuring-a-secure-wireless-network-part-1-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 3 Configuring a Secure Wireless Network Part 1 New

Your office has implemented a WLAN and needs you to configure the WLAN environment with three Cisco Meraki™ MR62 wireless access points (WAPs) in order to access the Internet and intercommunicate. Security is not overly important at this time.

WAP Placement:

 

The Visio® diagram provided, “Office Wireless Network,” shows the placement of each WAP within the building.

 

Firewall:

 

The firewall is located in the Data Center.

 

IP Information:

 

The organization has an external IP address of 23.4.178.126 and uses private IPv4 space on the 10 network. The IP space for internal routers and access points is 10.0.1.x with all IPs available above 10.0.1.10.

 

Before working on this assignment, research the wireless access pointon the Cisco Meraki™ documentation site.

 

Using the information from the Cisco Meraki™ site, document the configuration value to implement each device in the “WLAN Configuration Design Template” to allow all networked computers to communicate with each other and the Internet.

 

Complete the 1-page “WLAN Configuration Design Template” spreadsheet.

 

Create 1- to 2-page diagram depicting the process you took to identify the appropriate configuration settings for each device. Your audience is your director, so be clear and explain the vulnerabilities that exist in the implemented environment.

 

For the diagram you can use Visio®, Microsoft® Word, or PowerPoint® or other appropriate application.

CYB 360 Week 3 Team Technical Specification Document New

CYB 360 Week 3 Team Technical Specification Document New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-3-team-technical-specification-document-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 3 Team Technical Specification Document New

CYB 360 Week 3 Team Technical Specification Document

CYB 360 Week 4 Configuring a Secure Wireless Network Part 2 New

CYB 360 Week 4 Configuring a Secure Wireless Network Part 2 New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-4-configuring-a-secure-wireless-network-part-2-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 4 Configuring a Secure Wireless Network Part 2 New

An unsecured network poses risk of internal and external compromises. Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit.

Using the configurations and topology you added to the “WLAN Configuration Design Template” in Week Three, add security and segregate internal traffic.

 

Secure the network to:

 

Minimize the risk of intrusions

Identify attempted intrusions

Limit visibility of HR traffic on the network

Modify the “WLAN Configuration Design Template” to include:

 

Configuration changes to the existing devices

Introduction of other devices required to meet security objectives

Create a 10- to 12-slide PowerPoint® presentation for management to explain from a security standpoint the changes you will make and the reasons for those changes. Include the following in the presentation:

 

Describe basic security concerns as they relate to wireless networks.

Assess the security vulnerabilities, including active protocols, to the unsecured network.

Describe your selection of devices added to the network and their role in meeting the security needs of the network to include a justification of the WIPS or WIDS and encryption method selection.

Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network.

Provide a rationale for all of your choices.

Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®. The presentation should be “media-rich,” it should include voice-overs, graphics, interaction, and other techniques to create a dynamic multimedia presentation.

 

Be sure to include supporting images and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Images should not be copied unless the author permission is obtained or copyright-free images are used.

CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation New

CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-4-team-encryption-and-wips-wids-implementation-recent

For more classes visit

https://www.uopassignments.com/

This week your team is presenting recommendations to your director on implementing, securing, and monitoring the network for data security assurance.

Create a 6- to 8-slide PowerPoint® presentation for your director. The presentation should include:

Recommended encryption type

Recommended Wireless Intrusion Prevention System (WIPS) and Wireless Intrusion Detection System (WIDS) deployed and where

Summary of key security features to deploy

Any other appropriate recommendations

Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®.

 

Be sure to include supportive graphics and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Images should not be copied unless author permission is obtained or copyright free images are used.

CYB 360 Week 5 Attack Vectors and Wireless Network Hardening New

CYB 360 Week 5 Attack Vectors and Wireless Network Hardening New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-5-attack-vectors-and-wireless-network-hardening-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 5 Attack Vectors and Wireless Network Hardening New

This week you are reporting possible security threats to your network, how the network is hardened against such threats, and recommendations to harden the network further.

As a team, discuss likely threats against the network and decide on recommendations to harden the network.

Create a 1-page table listing possible security threats. Include attack vectors, how this network has been hardened against such attacks, and/or recommendations for further steps to take.

 

Combine documents from this and previous weeks:

 

Week 2: IPP HQ Layout

Week 3: Technical Specifications Document

Week 4: Encryption and WIPS/WIDS Implementation PowerPoint®

Include corrections and recommendations based on changes made to the wireless network and instructor feedback.

CYB 360 Week 5 Packet Capture Analysis New

CYB 360 Week 5 Packet Capture Analysis New

Check this A+ tutorial guideline at

https://www.uopassignments.com/cyb-360/cyb-360-week-5-packet-capture-analysis-recent

For more classes visit

https://www.uopassignments.com/

CYB 360 Week 5 Packet Capture Analysis New

You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark by doing the following:

Go to the Wireshark Sample Captures site, and download the following:

 

· wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic

 

· wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample

 

· nb6-hotspot.pcap Someone connecting to SFR’s wireless community network

 

· ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0×0

 

· wap_google.pcap contains two WSP request-response dialogs

 

Note: Only download these sample captures. Other captures may set off your computer’s system defenses.

 

Use Wireshark to view and analyze the sample captures.

 

Create a 1-page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture:

 

· Description of the traffic

 

· Description of the risks, if any, the traffic poses to the wireless network

 

· Countermeasures to take to secure network from any threat

 

Write a 1/2- to 1-page memo to management as a network security specialist explaining the following:

 

· How you can distinguish hostile packet data from normal packet data

 

· How you can recognize any attack signatures in the packets you analyze

 

· Provide a rationale for ranking the packets as you did