Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Investigation of Wireless Network Security Threats

Coursework Description

In this coursework, you will study and investigate one of the wireless network security threats using relevant mechanisms and tools. This should include literature review, practical experiments, setting up and configuring necessary tools such as Dagah to develop your security scenario. With Dagah, you can design attacks against targets, launch them, and review the security threats and testing results. Smartphone attacks can be simulated using various exploitations such as phishing, harvesting, iOS profile, and malicious application exploitations. For more information, You will only need to select one topic from the list below as follows:

1.SMS attack

2. NFC attack ? QR Code attack

3.Messaging Apps attack

4. Basic phishing

5.Harvester phishing

6.Android Agent post exploitation

7.iOS Agent post exploitation

You will use the penetration testing lifecycle to gather information through several means and sources for footprinting. This is to allow an ethical hacker to identify the target smartphone such as Android or iPhone App, give him/her a better understanding of the target’s mobile device and application services, plan its remote attack and create malicious app. To scan the wireless target systems for vulnerabilities identification and analysis you may use Airmon, Wireshark etc.

You will perform an experiment to demonstrate one of the above listed attacks on a simulated smartphone. This is to perform vulnerability risk threat assessment and to review the security requirements, design and implementation. The final outcomes and results are intended to provide a list of recommendations and any necessary justifications to improve the security of the wireless target. The implementation of any recommendations contained in your report should not guarantee the elimination of all security threats but should allow keeping the risks as minimum as possible. To achieve this, you will need to identify and clarify security issues for the core smartphone system, technical review and assessment of system architecture. 

Your report should attempt to provide a clear, unambiguous statement of the application and system configuration. This should include a review of the current service protocol(s), mechanism(s), tools and to 

provide an architectural diagram of the system and/or network. You will perform comparisons with relevant standards and be able to identify the major security risks and threats in the selected service. In your report, the chosen security attack through its mechanism should be evaluated in terms of its operations, techniques, settings, security threats etc. This is to allow you to propose the necessary mechanisms and solutions to meet the service needs. These efforts will highlight the good practices and findings about the threat and to consider various technical reports and relevant documents. You will need to study and specify the requirement details and evaluation of tools in terms of meeting the necessary services requirements.

The final outcomes and practical results are intended to provide any necessary justifications to ensure a reliable and secure delivery of the service. To achieve this, you may need to identify and clarify any issues for the core operating system, technical review and assessment of system architecture. Finally, you might think of any other issues that need to be considered. 

You will need to produce a professional technical report. Typically, your report might be organized (but not necessarily to be) as follows:

1. introduction

2. background information, scope and limitations

3. main body including methods used and investigations

4. experimental work

5. testing and analysis

6. conclusion

7. references (books, conference papers, journal publications, WWW references) You should clearly state any assumptions that you have made with justification in your report and discuss any alternatives to your proposed solutions.

support
close