Write My Paper Button

WhatsApp Widget

Information Security

BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney
Tutorial #5
Total Marks: 30 (6%)
Submit your answers to the following questions by Week-11 Friday 5:00PM. Late submissions
will incur 5% deduction with each passing day till Week-12 Friday 5:00PM, after which no
submissions will be accepted.
Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste
from your textbook, online resources, or your friend’s work. Cite and provide reference
(Harvard Style) to the original work where applicable.
Questions:
Q. #1: Go to page 338 of your e-textbook*, explain all the attacks shown in Figure 8-8 in your
own words. (10 Marks)
Q. #2: Explain Wi-Fi Protected Access (WPA) protocol. Why are TKIP and PSK used in it?
What is the best protection available for your wireless communication that you can configure
at your home router? (5 Marks)
Q. #2: Go to page 466 of your e-textbook*, complete the task Case Project 10-3: Rooting and
Jailbreaking and submit your response. (5 Marks)
Q. #3: Go to page 466 of your e-textbook*, complete the task Case Project 10-5: Internet of
Things and submit your response. (10 Marks)
* Ciampa, M. (2018), Security + Guide to network security fundamentals 6th edn. Cengage Learning,
United States.
Get access to your e-textbook on Moodle by going to Information Security unit > E-text tile.

AssignmentTutorOnline

Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?