Part 1
Please make assumptions to make each scenario more specific, as you feel necessary, making sure that these assumptions are realistic for each specific case. Make sure to document these assumptions.
Scenarios
Suppose you have been asked to install and configure a wireless network for the following two situations, and, in particular, it is your responsibility to configure the security of their networks. Here are the two scenarios:
Scenario 1
A building containing practitioner suites for 5 doctors, psychiatrists and psychologists.
Scenario 2
A hospital with 5 separate buildings, each with 100-200 rooms, comprising 10 separate wards (children, renal, oncology, etc).
Questions
Question 1
(15 marks) Create a security policy for Scenario 1 (a section within your assignment report) with the same headings as the example security policy given in week 6, including, in particular, stakeholders, objectives, and enforced rules.Question 2
(15 marks) Create a security policy for Scenario 2 (a section within your assignment report) with the same headings as the example security policy given in week 6, including, in particular, stakeholders, objectives, and enforced rules.Question 3
(10 marks) Compare the two scenarios. What are the key differences between their objectives? How are these differences likely to affect our different approach to implementing the wireless networks?
Answer 1. A house (i) A family home. Objectives: (a) anyone in the family or friends who visit. can gain access to the network within a few minutes (b) on future occasions, when family or friends return to the home, they will not need to reconfigure their computer or phone at all in order resume accessing the wireless network (c) the range of services and sites accessible is filtered in a way config urable by the family (d) non-family members, or visitors, are unable to access the wireless network at all, neither to make use of it for communication, or to listen to the traffic on the network (ii) A short-term rental home Objectives: (a) renters are able to gain access to the network relatively quickly (no more than 10 minutes). for the duration of their stay: (b) on future occasions, if a renter returns to the same location, renters will not be able to access the wireless network unless they are renting the property again: (c) non-renters are unable to make use of the wireless network 2. An office (1) A single company office Objectives: (a) All staff are able to configure their devices (computers, smartphones, and tablets) to access the wireless network within one day. (b) Performance of the network is good for all authorized users. (c) Anyone who is not part of the company cannot access the network of the company Security policies for wireless Security policies for wireless (ii) A multi-business office Objectives: (a) All staff are able to configure their devices (computers, smartphones and tablets) to access their own wireless network within one day. (b) Performance of the network is good for all authorized users, irrespec- tive of the traffic on the network generated by other companies. (c) Anyone who is not part of company A cannot access the network of company A at all 3. An educational institution (i) A school Objectives: (a) Students, teaching staff, and administration staff are able to configure their devices (computers, smart phones and tablets) to access the wireless network within one day. (b) Performance of the wireless network is satisfactory except in some locations (c) The range of services and sites accessible is filtered in a way config- urable by the school. (d) Access by students, staff, and administrative workers continues to work seamlessly so long as their status and role is unchanged. (e) Anyone who is not currently a student, teacher, or administrative per- son should not be able to access the wireless network (i) A university Objectives: (a) Students, teaching staff, administration staff, students and teaching staff of other universities, and guests are able to configure their de vices (computers, smart phones, and tablets) to access the wireless network at their home university within one day. Guest access may he limited (b) Performance of the wireless network is very good at almost all loca tions across the campus. (c) Students, and teaching staff from any affiliated university are able to access the wireless network of any other affiliated university seam- lessly without additional configuration, so long as their status and role is unchanged. Security policies for wireless Security policies for wireless (d) Access logs which show exactly what each user of the network has accessed are kept. (e) Anyone who is not currently a student, teacher, or administrative per- son can access the wireless network, but only as a guest, which may have limits to its performance. Answer 1. A house (i) A family home. Objectives: (a) anyone in the family or friends who visit. can gain access to the network within a few minutes (b) on future occasions, when family or friends return to the home, they will not need to reconfigure their computer or phone at all in order resume accessing the wireless network (c) the range of services and sites accessible is filtered in a way config urable by the family (d) non-family members, or visitors, are unable to access the wireless network at all, neither to make use of it for communication, or to listen to the traffic on the network (ii) A short-term rental home Objectives: (a) renters are able to gain access to the network relatively quickly (no more than 10 minutes). for the duration of their stay: (b) on future occasions, if a renter returns to the same location, renters will not be able to access the wireless network unless they are renting the property again: (c) non-renters are unable to make use of the wireless network 2. An office (1) A single company office Objectives: (a) All staff are able to configure their devices (computers, smartphones, and tablets) to access the wireless network within one day. (b) Performance of the network is good for all authorized users. (c) Anyone who is not part of the company cannot access the network of the company Security policies for wireless Security policies for wireless (ii) A multi-business office Objectives: (a) All staff are able to configure their devices (computers, smartphones and tablets) to access their own wireless network within one day. (b) Performance of the network is good for all authorized users, irrespec- tive of the traffic on the network generated by other companies. (c) Anyone who is not part of company A cannot access the network of company A at all 3. An educational institution (i) A school Objectives: (a) Students, teaching staff, and administration staff are able to configure their devices (computers, smart phones and tablets) to access the wireless network within one day. (b) Performance of the wireless network is satisfactory except in some locations (c) The range of services and sites accessible is filtered in a way config- urable by the school. (d) Access by students, staff, and administrative workers continues to work seamlessly so long as their status and role is unchanged. (e) Anyone who is not currently a student, teacher, or administrative per- son should not be able to access the wireless network (i) A university Objectives: (a) Students, teaching staff, administration staff, students and teaching staff of other universities, and guests are able to configure their de vices (computers, smart phones, and tablets) to access the wireless network at their home university within one day. Guest access may he limited (b) Performance of the wireless network is very good at almost all loca tions across the campus. (c) Students, and teaching staff from any affiliated university are able to access the wireless network of any other affiliated university seam- lessly without additional configuration, so long as their status and role is unchanged. Security policies for wireless Security policies for wireless (d) Access logs which show exactly what each user of the network has accessed are kept. (e) Anyone who is not currently a student, teacher, or administrative per- son can access the wireless network, but only as a guest, which may have limits to its performance