Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Wireless Security
  • Unit Code

    CSG3308
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

The unit will focus on securing wireless networks and related services. Students will be exposed to a wide range of techniques, tools and policy to secure wireless networks and wireless connected appliances. The unit will primarily examine problems relating to the 802.11 protocol suite.

Equivalent Rule

Unit was previously coded CSG420I, CSG4308, CSG5308

Learning Outcomes

On completion of this unit students should be able to:

  1. Based networks; apply appropriate security tools and auditing techniques to protect wireless computing environments and develop basic policies to protect wireless networks.
  2. Based networks; plan a secure wireless network deployment.
  3. Detail current wireless security issues and risks. Detail appropriate counter measures to address wireless security issues. Outline the main legal and ethical issues associated with security management of wireless computing and networks. Evaluate and provide advice on security issues associated with wireless networks.

Unit Content

  1. Effective policy and planning for wireless security.
  2. Examining current and contemporary issues in wireless security.
  3. Legal and ethical implications of wireless security technologies and techniques.
  4. Logical countermeasures to wireless threats.
  5. Physical countermeasures to wireless threats.
  6. RF Theory including modulation and antennas.
  7. Secure wireless deployment and planning.
  8. Vulnerabilities in wireless systems.
  9. Wireless LAN topologies and hardware.
  10. Wireless Security IEEE Standards and their applications.

Additional Learning Experience Information

Lectures, workshops, case studies and practical exercises.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentCreation of a user guide for a wireless router20%
Case StudyWireless network audit30%
Examination ^End of semester examination50%
ONLINE
TypeDescriptionValue
AssignmentCreation of a user guide for a wireless router20%
Case StudyWireless network audit30%
Examination ^End of semester examination50%

^ Mandatory to Pass

Text References

  • ^ David D. Coleman and David A. Westcott (2010). CWSP Certified Wireless Security Professional Official Study Guide. Sybex: John Wiley & Sons Ltd.
  • Nichols, R. K., and Lekkas, P.C. (2002). Wireless security: models, threats, and solutions. London: McGraw-Hill.
  • Andrew A. Vladimirov., Konstantin V. Gavrilenko and Adrei A. Mikhailovsky (2004) Wi-Foo: The Secrets of Wireless Hacking. Pearson/Addisson Wesley.
  • Vacca, John, R., (2006). Guide to Wireless Network Security. Springer.
  • Ciampa, M. (2006). CWSP guide to wireless security. Boston: Thomson Course Technology.
  • Peikari Cyrus (2006). Maximum Wireless Security.
  • Xiao, Yang, Shen, Xuemin (Sherman), Du, Ding-Zhu (2007) Wireless Network Security.
  • David D. Coleman and David A. Westcott (2010) CWSP Certified Wireless Security Professional Official Study Guide. (1st Ed.). Sybex: John Wiley & Sons Ltd.

Journal References

  • Virus Bulletin
  • Security Systems Digest
  • Security Management
  • Security Australia
  • Security
  • Computers and Security
  • Computer Security Journal
  • Wireless Network
  • Computer Crime Digest

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSG3308|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Wireless Security
  • Unit Code

    CSG3308
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

The unit will focus on securing wireless networks and related services. Students will be exposed to a wide range of techniques, tools and policy to secure wireless networks and wireless connected appliances. The unit will primarily examine problems relating to the 802.11 protocol suite.

Equivalent Rule

Unit was previously coded CSG420I, CSG4308, CSG5308

Learning Outcomes

On completion of this unit students should be able to:

  1. Based networks; apply appropriate security tools and auditing techniques to protect wireless computing environments and develop basic policies to protect wireless networks.
  2. Based networks; plan a secure wireless network deployment.
  3. Detail current wireless security issues and risks. Detail appropriate counter measures to address wireless security issues. Outline the main legal and ethical issues associated with security management of wireless computing and networks. Evaluate and provide advice on security issues associated with wireless networks.

Unit Content

  1. Effective policy and planning for wireless security.
  2. Examining current and contemporary issues in wireless security.
  3. Legal and ethical implications of wireless security technologies and techniques.
  4. Logical countermeasures to wireless threats.
  5. Physical countermeasures to wireless threats.
  6. RF Theory including modulation and antennas.
  7. Secure wireless deployment and planning.
  8. Vulnerabilities in wireless systems.
  9. Wireless LAN topologies and hardware.
  10. Wireless Security IEEE Standards and their applications.

Additional Learning Experience Information

Lectures, workshops, case studies and practical exercises.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
AssignmentCreation of a user guide for a wireless router20%
Case StudyWireless network audit30%
Examination ^End of semester examination50%
ONLINE
TypeDescriptionValue
AssignmentCreation of a user guide for a wireless router20%
Case StudyWireless network audit30%
Examination ^End of semester examination50%

^ Mandatory to Pass

Text References

  • ^ David D. Coleman and David A. Westcott (2010). CWSP Certified Wireless Security Professional Official Study Guide. Sybex: John Wiley & Sons Ltd.
  • Nichols, R. K., and Lekkas, P.C. (2002). Wireless security: models, threats, and solutions. London: McGraw-Hill.
  • Andrew A. Vladimirov., Konstantin V. Gavrilenko and Adrei A. Mikhailovsky (2004) Wi-Foo: The Secrets of Wireless Hacking. Pearson/Addisson Wesley.
  • Vacca, John, R., (2006). Guide to Wireless Network Security. Springer.
  • Ciampa, M. (2006). CWSP guide to wireless security. Boston: Thomson Course Technology.
  • Peikari Cyrus (2006). Maximum Wireless Security.
  • Xiao, Yang, Shen, Xuemin (Sherman), Du, Ding-Zhu (2007) Wireless Network Security.
  • David D. Coleman and David A. Westcott (2010) CWSP Certified Wireless Security Professional Official Study Guide. (1st Ed.). Sybex: John Wiley & Sons Ltd.

Journal References

  • Virus Bulletin
  • Security Systems Digest
  • Security Management
  • Security Australia
  • Security
  • Computers and Security
  • Computer Security Journal
  • Wireless Network
  • Computer Crime Digest

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSG3308|1|2