assignment consists
September 18, 2019
As more and more data are collected
September 18, 2019

Assignment Grading Rubric

Assignment Grading Rubric

Course: IT286 Unit: 5 Points: 50

Copyright Kaplan University

Unit 5 Assignment Outcomes addressed in this activity:

• Discuss wireless technology including wireless protocols, wireless devices, and wireless security. • Explain various types of wireless attacks and methods to mitigate these attacks. • Examine appropriate control mechanisms to secure data in virtualized environments and on the cloud.

Course outcome: IT286-3: Explain the protection of wireless networks and cloud services, and the hardening of hosts and applications. Instructions: NOTE: You will have two parts to the Assignment in this unit that will be submitted as one file through the Dropbox. Requirements: Unit Assignments include short essay, descriptive tables and screen captures demonstrating an understanding of the topics. Any resource used including the textbook should be properly cited. Documents should be submitted using APA Style (double-spaced with a title page and a reference page). Essays should be separated into sections by the Assignment Part number and the question number. Part 1 1. Create a table comparing WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2 Standard Definition Algorithm Suggested Use 2. In a short essay, describe Temporal Key Integrity Protocol (TKIP). What is it based on? What does it do? 3. You are asked to secure a wireless network by making sure only authorized computers connect. What can you do to accomplish this? Give an example. 4. Review Table 5.1 in your text that lists six different types of wireless attacks and matches an analogy of each attack. Do some research on these attacks and create a table of your findings. Attack Name Definition Result 5. In a short essay, define the three cloud computing service models. 6. In a short essay, examine the cloud computing delivery models. Give a scenario for each. 7. The following five topics describe important concepts for virtualizations: Snapshots, Patch Compatibility, Host Availability/Elasticity, Security Control Testing (SCT) and Sandboxing. Briefly define each of these and explain why it can be a security concern.

Assignment Grading Rubric

Course: IT286 Unit: 5 Points: 50

Copyright Kaplan University

Part 2 Lab Questions and Screen Captures 1. Connect a wireless network on a Windows system View the video on wireless connections before doing this lab. To set up a new wireless connection, select Set up a new network from the Network and Sharing Center window.

To enable an automatic wireless network configuration, select the wizard.

To manually connect to a wireless network, select the Manually create a network profile. To connect to an existing wireless network under Available networks, select the network name and then Configure. In Wireless Network Properties, specify the wireless network settings and specify the network name SSID (Service Set Identifier). Using only the SSID is not secure. Take a screen capture of the settings. 2. Wireless Capture Tools Note: Be cautious when downloading any software tool from insecure websites. Review a wireless packet sniffer tool (see suggestions below) and provide a brief description. Take a screen capture of the output data from the tool as shown on the wireless packet sniffer website (if not available, show features). Suggestions: Aircrack-ng – a set of tools for auditing wireless networks NetStumbler – wardriving to find open wireless access points InSSIDer – signal strength and access point finder, etc. 3. Platform as a Service Review a Platform as a Service (PaaS) vendor (Ex: Salesforce.com or Amazon Web Services) and describe how the client interacts with the cloud using this service. Outline several of the features of the platform and take a screen capture of the vendor’s marketing site and graphics. Review the grading rubric below before beginning this activity:

Assignment Grading Rubric

Course: IT286 Unit: 5 Points: 50

Copyright Kaplan University

Assignment grading rubric = 50 points

Assignment Requirements Points

Possible Points Earned

Part 1: Essay Questions

1. Create a table comparing WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2. Standard Definition Algorithm Suggested Use

0–5

2. In a short essay, describe Temporal Key Integrity Protocol (TKIP). What is it based on? What does it do?

0–4

3. You are asked to secure a wireless network by making sure only authorized computers connect. What can you do to accomplish this? Give an example.

0–4

4. Review Table 5.1 in your text that lists six different types of wireless attacks and matches an analogy of each attack. Do some research on these attacks and create a table of your findings. Attack Name Definition Result

0–6

5. In a short essay, define the three cloud computing service models.

0–3

6. In a short essay, examine the cloud computing delivery models. Give a scenario for each.

0–8

7. The following five topics describe important concepts for virtualizations: Snapshots, Patch Compatibility, Host Availability/Elasticity, Security Control Testing (SCT) and Sandboxing. Briefly define each of these and explain why it can be a security concern.

0–10

Part 2: Lab Questions and Screen Captures

1. Connect a wireless network on a Windows system. Take a screen capture.

0–3

Assignment Grading Rubric

Course: IT286 Unit: 5 Points: 50

Copyright Kaplan University

2. Review a wireless packet sniffer tool. Take a screen capture.

0–3

3. Review a Platform as a Service (PaaS) vendor. Take a screen capture.

0–4

Total (Sum of all points)

0–50

Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable.

New total after deductions

 

“Is this question part of your assignment? We Can Help!”


Assignment Grading Rubric was first posted on September 18, 2019 at 9:33 pm.
©2019 "Nursing Term Paper". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at ukbestwriting@gmail.com

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Assignment Grading Rubric was first posted on September 18, 2019 at 9:33 pm.
©2019 "nursing Writers". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@nursingtermpaper.org

 

"Is this question part of your assignment? We Can Help!"

Nursing Coursework