Assessment item 4 Case Study wireless communication

profilesam4arrow

Assessment item 4

Case Study

Value: 10%

Due date: 05-Oct-2015

Return date: 26-Oct-2015

Length: 1000-1200 words

Submission method options

Alternative submission method

Task

A local IT company ZeTech needs your help with a WLAN security project report for BCE. BCE is a medium size sports company and has 8 offices all around the world with 400-450 employees and around 500 daily customers on average. BCE would like to learn more about WLAN security so that the systems will be secured from any attacks or hacking.

In your report you are required to outlines the security strengths and weaknesses of WLANs and makes recommendations about the level of security. Security solutions in your report should recommend BCE in a variety of situations, such as when desktop computer, laptop, and wireless equipments (iPad, Tablet, etc) are used in offices by staff and customers. Your report should cover encryption and authentication using 802.11i and 802.11X.

Rationale

This assessment is designed to:

  • assess your progress towards meeting subject learning outcomes 1, 4, and 7;
  • assist you to develop your learning through discussion of the principles covered in Topics 6 and 9 of the subject;
  • develop your ability to communicate well in writing.

Marking criteria

Task Name: Case Study
Value: 10%

CRITERIA

STANDARDS

High Distinction (85%-100%)

Distinction (75%-84%)

Credit (65%-74%)

Pass (50%-64%)

Fail (0-49%)

1. Describe security strengths and weaknesses of WLANs Marks: 20

All possible security strengths and weaknesses of WLANs are clear described.

Most of the security strengths and weaknesses of WLANs are clear described.

Most of the security strengths and weaknesses of WLANs are clear described.Some omissions.

Some security strengths and weaknesses of WLANs are clear described.

Major omissions in the answer.

 2. Recommend security solutions in variety of situations when desktop computer, laptop, and wireless equipments (iPad, Tablet, etc) are used in offices by staff and customers. Marks: 30

Security solutions are recommended with valid justification/assumptions in variety of situations for number of equipments used by staff and customers

Security solutions are recommended with some justification/assumptions in variety of situations for number of equipments used by staff and customers

Security solutions are recommended with some justification/assumptions in variety of situations for number of equipments used by staff and customers. Some omissions.

Little justification of the recommended security solutions.

No justification and invalid assumption Major omissions in the answer. 

3. Explain encryption and authentication schemes using 802.11i and 802.11X. Marks: 20

Comprehensive explanation of encryption and authentication schemes using 802.11i and 802.11X.

Mostly comprehensive explanation of encryption and authentication schemes using 802.11i and 802.11X.

Mostly comprehensive explanation of encryption and authentication schemes using 802.11i and 802.11X. Some omissions.

Reasonable answer about encryption and authentication schemes using 802.11i and 802.11X.

Major omissions in the answer.

 4. Presentation and clarity (accuracy, spelling, grammar, punctuation) of assignment. Marks: 20

Shows a polished and imaginative approach to complete the assignment. Very well fluent writing style appropriate to
assignment with accurate grammar and spelling.

Carefully and logically organised approach to complete the assignment. Fluent writing style appropriate to assignment with accurate grammar and spelling

Shows organisation and coherence approach to complete the assignment. Mostly fluent writing style appropriate to assignment with accurate grammar and spelling

Shows some attempt to organise approach in a logical manner to complete the assignment. Writing style not always fluent or well organised, and grammar and spelling contain errors Disorganised/incoherent
assignment.
 
 

Writing style not fluent or well-organised, and grammar and spelling contain lots of errors

 5. Referencing and Citation Marks: 10

Referencing is consistently accurate and according to the APA standard. All references are cited in the text

Referencing is mainly accurate and according to the APA standard. Most of the references are cited in the text

Some attempt at referencing and not according to the APA standard. Few references are cited in the text

Some attempt at referencing but not cited in the text

Referencing is absent/unsystematic

 

 

 

    • Posted: 4 years ago
    • Due: 
    • Budget: $15
    Answers 1
    • case study 4 wireless communication
      Answer rating:5Stars out of2ratings

    Purchase the answer to view it

    blurred-text
    • Not rated

      Case Study

      Please find task in attachment file thanks