We're Open
+44 7340 9595 39
+44 20 3239 6980

[Solved] EXPLAIN THE USE OF THIS TECHNIQUES TO SECURE OR MANAGE WLAN

  100% Pass and No Plagiarism Guaranteed

[Solved] EXPLAIN THE USE OF THIS TECHNIQUES TO SECURE OR MANAGE WLAN

Here, you are asked to present a report including one technique of the mentioned to secure and/or manage WLAN. You are required to categorize the tool and the technique and include screenshots as evidence and detail explanation to report working mechanism of the identified technique. You are required to explain the use of the technique “evaluation” to secure and manage WLAN.

  1. Test the tool and report one technique (such as WLAN discovery, penetration testing, vulnerability assessment, etc) to secure and/or manage WLAN.Your report should:
    1. Categorize the tool (WLAN Analysis, Exploitation and Stress Testing tools) and the technique (WLAN discovery, penetration testing, vulnerability assessment, etc)
    2. Include screenshots (as an evidence that you actually implemented the technique) and detail explanation to report working mechanism (the step by step process) of the identified technique.
    3. Explain the use (evaluation) of this techniques to secure and/or manage WLAN.

 

  1. Submit a one (1) minute video along with audio to demonstrate your implementation (the tutor must be able to recognize you in the video).Your video file format must be compatible with video playing software available in MIT labs. Failure to submit the video (using Moodle submission link) will result a failing grade.

Plagiarism

All used sources must be properly acknowledged with references and citations, if you did not create it. Quotations and paraphrasing are allowed but the sources must be acknowledged. Failure to do so is regarded as plagiarism and the minimum penalty for plagiarism is failure for the assignment. The act of giving your assignment to another student is classified as a plagiarism offence. Copying large chucks and supplying a reference will result in zero marks as you have not contributed to the report.

Scenario 1

You need to have a tool that will provide detailed information about networks and its security measures to make sure that the network will be kept secure. It should also give you give information about the signal to noise ratio which is important to process and get access to the network.  It should also help you to find out your Wi-Fi extent range.

Scenario 2

You are installing a Wi-Fi network for which you need a network discovery tool that gathers information about nearby wireless access points in real time.  It should also have features such as: Generating reports in Adobe PDF format that include the list of access points and their properties, Powerful and innovative logging and recording capability. Reviewing recorded data a snap. Support for multiple installed wireless adapters installed- option to select the adapter that you need.

Late submission of assignments will be penalised as follows:

  • For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day.
  • For assignments more than 5 days late, a penalty of 100% will apply.

Your submission must be compatible with the software (PDF/Word) in MIT, Computer Laboratories/Classrooms.

Extensions:     Under normal circumstances extensions will not be granted. In case of extenuating circumstances—such as illness—a Special Consideration form, accompanied by supporting documentation, must be received before 3 working days from the due date.  If granted, an extension will be only granted only by the time period stated on the documentation; that is, if the illness medical certificate was for one day, an extension will be granted for one day only.Accordingly the student must submit within that time limit.

Penalties may apply for late submission without an approved extension.

Penalties:        Academic misconduct such as cheating and plagiarism incur penalties ranging from a zero result to program exclusion.

Marking aspects:

Marks are allocated as indicated on each question, taking the following aspects into account:

Aspects

Description

Marks

Evaluation

Explain the use of the technique

05

Explanation

Description/explain how to use the technique

05

Report structure

Inadequate structure, careless presentation, poor writing

04

Reference style (IEEE)

Proper referencing if required

02

Video along with audio demonstration

Successful video demonstration to support submitted report.

04

 

 

 

Marking Rubric for Exercise Answers

Grade

Mark

HD

80%+

D

70%-79%

CR

60%-69%

P

50%-59%

Fail

< 50%

 

Excellent

Very Good

Good

Satisfactory

Unsatisfactory

Evaluation

 

/3

Logic is clear and easy to follow with strong arguments

Consistency logical and convincing

Mostly consistent and convincing

Adequate cohesion and conviction

Argument is confused and disjointed

Sophistication and effectivity

 

/2

The presented solution demonstrated an extreme degree of sophistication and effectivity to secure and/or manage WLAN

The presented solution demonstrated a high degree of sophistication and effectivity to secure and/or manage WLAN

The presented solution demonstrated an average degree of sophistication and effectivity to secure and/or manage WLAN

The presented solution demonstrated a low degree of sophistication and effectivity to secure and/or manage WLAN

The presented solution demonstrated a poor degree of sophistication and effectivity to secure and/or manage WLAN.

Explanation

/5

All elements are present and well integrated.

Components present with good cohesion

Components present and mostly well integrated

Most components present

Lacks structure. 

Reference style

/2

Clear styles with excellent source of references.

Clear referencing/ style

Generally good referencing/style

Unclear referencing/style

Lacks consistency with many errors

Report structure and report presentation

/4

Proper writing. Professionally presented

Properly written, with some minor deficiencies

Mostly good, but some structure or presentation problems

Acceptable presentation

Poor  structure, careless presentation

Video of Demonstration

/4

 

Successful completion and well understanding of the outcome.

Successful completion and understanding of the outcome.

Partially completed and partially understanding of the outcome.

Partially completed and did not understanding of the outcome.

Not completed and did not understanding of the outcome.

 


100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: [Solved] EXPLAIN THE USE OF THIS TECHNIQUES TO SECURE OR MANAGE WLAN
  • Price: £ 99
  • Post Date: 2021-10-25T04:43:30+00:00
  • Category: Assignment Queries
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

[Solved] EXPLAIN THE USE OF THIS TECHNIQUES TO SECURE OR MANAGE WLAN [Solved] EXPLAIN THE USE OF THIS TECHNIQUES TO SECURE OR MANAGE WLAN
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

My writer did a small error in my work but it was fixed by him shortly. The work is admirable and I have submitted it. Now hoping for the best results. I would inform you soon.
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I ordered the literature review for my research project in rush delivery. I was not expecting that they would complete my order 2 hours before my chosen time. The quality is also nice. Thank you for help.