Cyb 360 cyb360 cyb 360 education for service uopstudy.com
1. CYB/360
Wireless Security
The Latest Version A+ Study Guide
**********************************************
CYB 360 Entire Course Link
http://www.uopstudy.com/cyb-360
**********************************************
CYB 360 Wk 1 - Apply: Wireless Network Needs and
Requirements
You are part of the networking team for a plastics manufacturing company, International
Plastics, Inc., reporting to the Director of IT Infrastructure.
The Director gave you an assignment to create detailed technical plans for the creation of
a secure wireless network at the Corporate Offices only.
The wireless network must meet the following criteria:
Cover the entire campus with no loss of connectivity when moving from one area
to the next
Comply with all FCC regulations
Be fast enough for employees to complete normal business activities while using
wireless connectivity
Be cost effective (The organization wants costs minimized while still meeting the
other requirements.)
Be secure (Due to client contractual terms, the wireless network must be very
secure and prevent Man-in-the-Middle attacks.)
Write a 1- to 2-page report for the director of IT describing the requirements you are
considering as your team implements the wireless network. Include the following:
Design requirements that must be addressed
2. Justification to use different frequencies, channels, and antennae in the
installation
Regulatory requirements to consider in implementation
Security requirements
Create a 1/2-to 1-page table summarizing possible frequency choices. Include an
explanation of the strength and weakness of each.
Format any citations according to APA guidelines.
Submit your assignment.
For More Classes Please Visit
http://www.uopstudy.com/
CYB 360 Wk 2 - Apply: Site Survey
Site surveys are an important part of planning a secure wireless network. In
this assignment, you will conduct a visual assessment of a familiar environment in
order to produce a site survey.
Perform a basic assessment of a familiar environment (e.g., your home, work, or a local
business).
Identify the following:
Your goal (e.g., provide wireless coverage for a two-story house with two desktop
computers and a printer)
Possible sources of interference
Existing wireless infrastructure
Potential access point placement
Potential antenna placement
Potential equipment and supporting equipment
Note: You may provide photographs to support the site survey.
Based on your visual inspection of the site, create a 1- to 2-page site survey. Provide your
conclusions from your assessment and detail the following:
Methods of gathering information
Information gathered
Possible sources of interference
Existing wireless infrastructure
Recommendations for access point and antenna placement
Recommendations for equipment and supporting equipment
3. Format any citations according to APA guidelines.
Submit your assignment.
CYB 360 Wk 2 Team - Apply: Determine Wireless Access Point
Locations
As in Week 1, you are part of the networking team for a plastics manufacturing company,
International Plastics, Inc., reporting to the Director of IT Infrastructure.
The Director gave you an assignment to create detailed technical plans for the creation of
a secure wireless network at the Corporate Offices only.
In Week 1, you addressed the following capabilities the wireless network must have:
Cover the entire campus with no loss of connectivity when moving from one area
to the next
Comply with all FCC regulations
Be fast enough for employees to complete normal business activities while using
wireless connectivity
Be cost effective (The organization wants costs minimized while still meeting the
other requirements.)
Be secure(Due to client contractual terms, the wireless network must be very
secure and prevent Man-in-the-Middle attacks.)
Documents required to be submitted with the plan:
Building floorplan showing WAP placement
Logical network diagram created in Visio®
showing the wireless network, as well
as its connection to the main IT network
Technical Specifications outline
Your team will work together over the next 5 weeks to create the technical plan
documentation week by week with the final product due at the end of the course.
This week your team must determine the locations of the wireless access points for the
International Plastics, Inc., corporate headquarters.
For More Classes Please Visit
http://www.uopstudy.com/
CYB 360 Wk 3 - Apply: Configure a Secure Wireless Network
4. Your office has implemented a WLAN and needs you to configure the WLAN environment
with 3 Cisco Meraki MR62 wireless access points (WAPs) in order to access the Internet
and intercommunicate. Security is not overly important currently.
WAP Placement:
The Office Wireless Network diagram shows the placement of each WAP within the
building.
Firewall:
The firewall is in the Data Center.
IP Information:
The organization has an external IP address of 23.4.178.126 and uses private IPv4 space
on the 10 network. The IP space for internal routers and access points is 10.0.1.x with all
IPs available above 10.0.1.10.
Research the wireless access point on the Cisco Meraki Documentation site.
Document the configuration, using the information from the Cisco Meraki site, value to
implement each device in the WLAN Configuration Design Template to allow all
networked computers to communicate with each other and the Internet.
Complete the WLANConfiguration Design Template.
Create 1-page diagram depicting the process you took to identify the appropriate
configuration settings for each device. Your audience is your director and you must be
clear and explain the vulnerabilities that exist in the implemented environment.
For the diagram you can use Visio®
, Microsoft Word, or Microsoft PowerPoint®
or other
appropriate application.
Format any citations according to APA guidelines.
Submit your assignment.
CYB 360 Wk 4 - Apply: Configuring a Secure Wireless Network
An unsecured network poses risk of internal and external compromises. Users in human
resources typically transmit sensitive information across the network. The network should
encrypt HR data in transit.
Using the configurations and topology you added to the WLAN Configuration Design
Template in Week 3, add security and segregate internal traffic.
5. Secure the network to:
Minimize the risk of intrusions
Identify attempted intrusions
Limit visibility of HR traffic on the network
Modify the WLAN Configuration Design Template to include:
Configuration changes to the existing devices
Introduction of other devices required to meet security objectives
Create a 10- to 12-slide Microsoft PowerPoint®
presentation for management to explain
from a security standpoint the changes you will make and the reasons for those changes.
Ensure you do the following in the presentation:
Describe basic security concerns as they relate to wireless networks.
Assess the security vulnerabilities,including active protocols, to the unsecured
network.
Describe your selection of devices added to the network and their role in meeting
the security needs of the network to include a justification of the WIPS or WIDS and
encryption method selection.
Determine how new devices changed the network design and affected
configuration settings to include sensors used to monitor the network.
Provide a rationale for your choices.
Note: Other applications like Adobe Spark, Microsoft Sway, or Microsoft Office Mix can be
used instead of Microsoft PowerPoint. Create a “media-rich” presentation by including
voice-overs, graphics, interaction, and other techniques to create a dynamic multimedia
presentation.
Be sure to include supporting images and appropriate backgrounds and styles. All
references must be attributed, cited appropriately throughout the document, and adhere to
APA guidelines. Do not copy images unless author permission is obtained or copyright
free images are used.
Format any citations according to APA guidelines.
Submit your assignment.
For More Classes Please Visit
http://www.uopstudy.com/
CYB 360 Wk 4 Team - Apply: Encryptionand WIPS/WIDS
Implementation
6. This week your team is presenting recommendations to your director on implementing,
securing, and monitoring the network for data security assurance.
Create a 6- to 8-slide presentation for your director. You may use Microsoft PowerPoint,
Adobe®
Spark, Microsoft Sway®
, or Microsoft Office Mix. The presentation must include
supportive graphics, appropriate backgrounds, and styles.
Note: Do not copy images unless author permission is obtained or copyright free images
are used.
Complete the following in your presentation:
Recommend encryption type.
Recommend Wireless Intrusion Prevention System (WIPS) and Wireless Intrusion
Detection System(WIDS) deployed and where.
Summarize key security features to deploy.
Include any other appropriate recommendations.
Format any citations according to APA guidelines.
Submit your assignment.
For More Classes Please Visit
http://www.uopstudy.com/
CYB 360 Wk 5 - Apply: PacketCapture Analysis
You are hired by an organization to analyze packet captures from a wireless network. You
are looking to assess if the captures pose a threat.
Analyze the packet captures provided by Wireshark by doing the following:
Go to the Wireshark Sample Captures site and download the following:
wpa-Induction.pcap.gz Wi-Fi802.11 WPA traffic
wpa-eap-tls.pcap.gzWiFi802.11 WPA-EAP/Rekey sample
nb6-hotspot.pcap Someone connecting to SFR's wireless community network
ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP)
version 0x0
wap_google.pcap contains two WSP request-response dialogs
Note: Only download these sample captures. Other captures may set off your
computer’s system defenses.
Use Wireshark to view and analyze the sample captures.
7. Create a 1- to 2-page table that ranks the packet captures from the highest to lowest
threat. In your table, provide the following for each packet capture:
Description of the traffic
Description of the risks, if any, the traffic poses to the wireless network
Countermeasures to take to secure network from any threat
Write a 2- to 3-page memo to management as a network security specialist, and ensure
you do the following:
Explain how to distinguish hostile packet data from normal packet data.
Explain how to recognize any attack signatures in the packets you analyze.
Provide a rationale for ranking the packets as you did.
Format any citations according to APA guidelines.
Submit your assignment.