Scenario/Summary
During Week 2, you should have completed iLab 2 of 6: Best Practices for Securing a Wireless Network in a SOHO—The Policy Statement, Processes, and Procedures Guidelines. In this lab, you will explore, select, and justify the selection of a secure wireless network for that (iLab 2) SOHO environment. You shall actually identify the hardware and software needed to support the network security policies and user requirements.
The reason for this lab is to allow you to experience the wireless network technology selection process while working with a typical set of requirements and the current industry offerings.
Basic Wireless Network Requirements and Assumptions
Consult your iLab 2 of 6: Best Practices for Securing a Wireless Network in a SOHO—The Policy Statement, Processes, and Procedures Guidelines for a foundation to your design requirements.
Create your own user requirements that are reasonable and typical for a SOHO.
Note: If you did not complete iLab 2, then request a policy statement from your instructor as soon as possible. You may also use policy statements that you find in iLab 2’s resource.
Listen
Document Authoring Guidelines
Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have selected.
Lab Document Framework
· Requirements and Policies of the Secure Wireless Network: State the requirements and general security policies that will drive your design of a secure wireless network at the SOHO. It should be about 5–10 sentences or bullet points.
· Secure Wireless Network Solution Overview: Outline the technical functionality and customer requirements of your secure wireless network. Tell us what the design can do. Include any special conditions, limitations, or exceptions that exist. It should be about 5–10 sentences or bullet points.
· Secure Wireless Network Design Illustration: Using a graphic illustration tool, such as Visio, document the logical design of your secure wireless network design. It should be about two pages.
· Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, give yourself credit, and tell us why you believe it is correct.
Step 1
Outline a set of requirements that are aligned with your policy statement. Given those requirements, select one potentially acceptable secure wireless network solution found through your research (see suggested resources). This is likely to be a combination of vendor products and services. An example is provided in the textbook and in the URLs below.
Listen
Step 2
Outline the technical functionality of your secure wireless network. Indicate what the secure wireless network can do, with respect to the policy statement and your requirements.
Listen
Step 3
Create a logical graphic illustration of the secure wireless network design. Show how the technical functionality and customer requirements come together in your design and selections.
Listen
Suggested Resources
Your textbook and other related textbooks The DeVry Online Library
Professional journals and security website
News media releases
Security vendor and contributor websites (See the examples below, but be aware that URLs do change without notice.)
· https://www.google.com/search?q=wireless network designs for small business
· https://www.google.com/search?q=cisco wireless network designs for small business
· https://www.google.com/search?q=netgear wireless network designs for small business
· https://www.google.com/search?q=security issues in wireless network designs for small business
· https://www.google.com/search?q=security issues in wireless network designs blackhat