computer systems, networks and security

FIT1047 { Introduction to computer
systems, networks and security
Assignment 2 { Semester 2, 2018
Submission guidelines
This is an individual assignment, group work is not permitted.
Deadline: October 12, 2018, 23:55pm
Submission format: PDF (one file containing both parts 1 and 2), uploaded electronically via Moodle.
Late submission:
By submitting a special consideration form, available from http://www:monash:edu:au/
Or, without special consideration, you lose 5% of your mark per day that you
submit late (including weekends). Submissions will not be accepted more than 5
days late.
This means that if you got
x marks, only 0:95n × x will be counted where n is the
number of days you submit late.
Marks: This assignment will be marked out of 90 points, and count for 22.5% of your
total unit marks.
Plagiarism: It is an academic requirement that the work you submit be original.
Zero marks will be awarded for the whole assignment if there is any evidence of copying
(including from online sources without proper attribution), collaboration, pasting from
websites or textbooks.
Monash University’s Academic Integrity Policy applies to all assessment:
Further notes: Your report needs to be your individual work (no group work is permitted). You should structure the report in accordance with the items in the task
description. However, there is no need to follow a strict template for technical reports,

but it should be well structured, readable, and use adequate language. All information from external sources must be properly referenced (see resources on Moodle about
referencing). References do not count for the word count.
You should stick to the word count. Write at least as many words as required, but not
more than the maximum. A maximum of 20 percent above the maximum word count
is acceptable. Additional text will be ignored in the marking. You should first think
about the main statements you want to make and then write a concise text.
When you are asked to use internet resources to answer a question, this
does not
mean copy-pasting text
from websites. Write answers in your own words such that
your understanding of the answer is evident. Acknowledge any sources by citing them.

1 WLAN Network Design and Security
For this task, you will perform a WLAN site survey. Your task is to produce a map
of (part of) a building that gives an overview of the wireless networks that are available,
as well as an analysis of the network.
What you will need: a WiFi-enabled laptop (some smartphones also work, see below),
and a place to scan. You can perform a survey of your home, of an office space, of parts
of the Monash campus, or inside a shopping centre. If you don’t own a suitable device
that you could use for this activity, please try to borrow one from a friend, or contact
us to figure out an alternative.
This activity has two sub-tasks.
1.1 Survey (30 marks)
Create a map of the place you want to survey. A simple floorplan will be sufficient, it
doesn’t have to be perfectly to scale (see below for an example). Your survey should
cover an area of
at least 60 square meters (e.g. 6×10 meters, or 4×15, or two storeys
of 6×5 each). Be creative { the survey can include hallways or outside areas. Be sure
to take the analysis in part 1.2 into account, by designing your survey to include walls,
doors etc. it will be easier to write something interesting in part 1.2.
Furthermore, your survey must include
at least three WiFi access points. These can
be your own, but can also include neighbours’ APs. If you are scanning in a commercial
area or on campus, you should be able to see enough APs. If you want, you can create
an additional AP with a phone (using Personal hotspot” or Tethering” features).
For the survey, use a WLAN sniffing tool (see below) at
at least eight different
on your map. For each location, record the technical characteristics of all
visible APs. Depending on the scanning tool you use, you can record features such as
network name, MAC address, signal strength, security, 802.11 version(s) supported,
band (2.4 or 5 GHz) and channel(s) used.
Add the data gathered from the survey into the map of the covered area. On the
map you should indicate the location of the access points and the locations where you
took measurements.For the access points, use the actual location if you know it, or an
approximation based on the observed signal strength (e.g. if its your neighbours access
point and you dont know exactly where it is).For each measurement point, you can
either add the characteristics directly into the map, or create a separate table with the
details. You can submit several maps if you choose to enter data directly into the maps,
or a single map if you use additional tables. Create the map yourself,
do not use the
mapping features
available in some commercial (i.e., paid) WLAN sniffing tools.

1.2 Report (25 marks)
Write a report (word limit 600) on your observations analysing the data collected in the
previous step. The report does not have to follow any particular structure (i.e. simply
answering the following questions is enough, you don’t need an executive summary, table
of contents etc). Your analysis should investigate the following aspects:
Channel occupancy: Are different access points competing on the same channels? Are they configured to use overlapping channels? (5 marks)
Interference from walls, doors etc.: How do different materials affect signal
strength and noise? Can you notice a difference in attenuation for different APs?
(5 marks)
Coverage: Do the access points sufficiently cover the desired area? Could the
placement or configuration be improved?
(5 marks)
Two other aspects of your own choice. Here are a few suggestions:
{ measure the attenuation caused by your own body
{ measure the download and upload speeds in different locations
{ determine the overlap that has been implemented to enable roaming
{ describe how you interpolated the locations of access points from the signal
{ explain signal-to-noise ratio either using measured noise or by assuming that
noise is slightly below the weakest signal your scanning software can detect.
Describe your findings and explain them with some technical detail (i.e., not only
say what you found, but also how you performed the analysis or why you think
the network is behaving that way).
(10 marks)
1.3 Tools
You can use e.g. Acrylic Wifi ( for Windows, NetSpot
( for Mac OS and Windows, and LinSSID or wavemon for
Linux. If you have an Android smartphone, apps like Wifi Analyzer can also be used.
On iOS, WiFi scanning apps do not provide enough detail, so iPhones won’t be suitable
for this task. For drawing the site maps, any drawing tool should work, for example
LucidChart, or even presentation tools such as PowerPoint, Keynote or Google Slides.
Scans of hand-drawn maps are acceptable if they are neat and easily readable.

1.4 Example floorplan
This is just to give you an idea of the level of detail required in the map. In addition to
the map, your survey would have to include tables that contain details and measurements
for the indicated locations.
1 2
4 5
Dimensions: 10 m (width) × 6 m (height)
Red circles: access points
Blue circles: locations of measurements

2 Cyber Security
Information on security problems, weaknesses and attacks can be found in many places
(blogs, newsletters, experts’ pages, etc.). Your task is to pick one item from the following
list, read the news item, look up and read the referenced sources, and finally write a
report on the findings.
https://www:theregister:co:uk/2018/08/17/usenix cookies/
security vulner 15
1. Chose one of the 7 news items above, read the text.
2. Look up and read the articles and information referenced in the news item.
3. Write a
short summary of the news item in your own words (max 200 words).
Identify which software, hardware or system is affected (max 50 words).
The identification should be as precise as possible. Include exact product names,
distribution of the product, version numbers, etc.
5. Describe
how the problem was discovered and how it was initially published. Try to find this information in the referenced articles. The problem might
have been found by researchers at a university, by a professional security company,
by some hacker, published in a scientific conference/journal, in a newspaper on a
blog, etc. Was it the result of targeted research, found by chance, were any tools
used, etc? (write 50-100 words)
6. Estimate how serious the issue/weakness/attack is, describe what is necessary to
exploit the weakness, evaluate what the consequences might be if it is exploited,
and what reactions you think are necessary/useful on (i) a technical level, (ii) in
terms of human behaviour, and (iii) on a policy level (between 200 and 350 words).
(35 marks)