OFFERS! offer image Get Expert-crafted assignments
Save 51%

LD7008 Wireless Networks and Security Assessment 2, 2026 | NU

Request Plagiarism Free Answer Published: 08 Jan, 2026
Category Assignment Subject Computer Science
University Northumbria University Module Title LD7008 Wireless Networks and Security
Word Count 2000 Words
Assessment Title Assessment A2
Academic Year 2026

LD7008 Assessment Brief:

Module Code

LD7008

Module Title

Wireless Networks and Security

Statement of task

Assessment A2

This assessment invites you to address the following task:

1. Critical appraisal of the global nature of WLAN standards and design
2. To gain critical understanding of the core concepts in wireless and mobile communication technologies, modelling of wireless channel, security threats and vulnerabilities associated with wireless networks.
3. Critically analyse security protocols associated with wireless local area networks (WLANs) as well as apply specialist knowledge to design and evaluate a secure wireless network.
4. Critically evaluate and apply suitable security measures to protect wireless networks against known vulnerabilities.
5. Demonstrate ability to work in culturally diverse groups and teams and make appropriate and personal contributions to team effectiveness

Word Limit

The total word limit for this assessment paper should have no more than 2000 plus the 10% which is allowed to add.

Weighting

This assessment is worth 50 %_A2

Submission Time and Date

The deadline is 16/01/2026 no later than 16:00 GMT

Submission of Assessment

This assessment should be submitted electronically, online via Turnitin. You will find a Turnitin link to submit your assessment on the module eLP Blackboard site.  It is your responsibility to ensure that your assessment is submitted by the submission deadline stated. Penalties apply for late submissions

Provision of feedback

Written feedback will be provided on 06/02/2026

This assignment consists of one component.

A2 – 2000 words submitted plus 10% apart of the tables and references.

Instructions on Assessment:

You are to perform a study on various 802.11 wireless networks to choose a suitable security measure that should be put in place for a given scenario.

This assignment is divided in two parts. The study will be partially theoretical and technical. The technical part (part A) will require you to evaluate the effectiveness of using various standards against known attacks. You will then in part B identify what are the security measures that the company in the chosen scenario should consider implementing.

Part A: Technical flaws research

You will need to investigate several known security flaws on the various 802.11 security protocols. You should demonstrate that were able to exploit those security flaws by exploiting them in your test environment either at home or in the lab.

You should also consider the various possible types of deployment such as in infrastructure deployment of 802.11 or in enterprise mode.

1.WLAN authentication if SSID is hidden and if administrators use MAC filtering.
2.WLAN encryption flaws (WEP, WPA2).
3.802.11 clients and identify flaws and they can be exploited.

Part B: Scenario based interpretation

Based on your findings in part A, you are required to analyse results obtained and choose suitable security measures for your chosen scenario. Following this, you are expected to defend your security choices by comparing your justifications with different research papers discussing the effectiveness of wireless security protocols in different environments.

Effectiveness of the chosen security measures should be evaluated in term of how they can be exploited (if possible), how suitable they are for the environment they will be used in and the threats that the scenario is subject to.

You will need to choose one scenario from the list below:

  • A small company that only allows staff to access the network.
  • A coffee shop that allows its customers to access the wireless network.
  • A large company that has various levels of access controls in their company.
  • Guests only network where people can use the network for a specific time.
  • A home family wireless network.

Instructions

  • You are required to use the template available in assessment page (IEEE template)
  • You are expected to use research papers and reference them in your document.

Word count

You should not exceed 5 pages using the template with the same font size. This is roughly around 2000 words.

Mapping to Programme Goals and Objectives

Learning Outcomes tested in this assessment:

The following Learning outcomes will be addressed in this assignment:

  • LO1 Understand the global nature of WLAN standards and design.
  • LO2. Be able to describe, explain critically and assess wireless and mobile data communication technologies deployed along with associated security issues.
  • LO4. Apply suitable security measures to protect wireless networks against known weaknesses
  • LO5 Demonstrate their ability to work in culturally diverse groups and teams and make appropriate and personal contributions to team effectiveness

Need Expert Help for Your LD7008 Wireless Networks and Security Assessment 2?

Request to Buy Answer

Module Specific Assessment Criteria and Rubric

Requirements Max mark
Abstract (max 100 words (discuss scenario)) 5
Introduction 10
Technical flaws- Research how to bypass WLAN authentication if SSID is hidden and if administrators use MAC filtering. 20
Technical flaws- Research WLAN encryption flaws (WEP, WPA2). 20
Technical flaws- Research 802.11 clients and identify flaws and they can be exploited 15
Choose the most suitable security measures for your scenario and justify your choice. 15
Conclusion 10
References 5

Assessment Regulations

You are advised to read the guidance for students regarding assessment policies. They are available online here.

Academic Misconduct

The Assessment Regulations for Taught Awards (ARTA) contain the Regulations and procedures applying to cheating, plagiarism, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct.
    
The full policy is available here
 
You are reminded that plagiarism, collusion, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct, as referred to in the Academic Misconduct procedure of the assessment regulations, are taken very seriously. Assignments in which evidence of plagiarism or other forms of academic misconduct is found may receive a mark of zero.

Late submission of work 

Where coursework is submitted without approval, after the published hand-in deadline, the following penalties will apply. For coursework submitted up to 1 working day (24 hours) after the published hand-in deadline without approval, 10% of the total marks available for the assessment (i.e.100%) shall be deducted from the assessment mark.

For clarity: a late piece of work that would have scored 65%, 55% or 45% had it been handed in on time will be awarded 55%, 45% or 35% respectively as 10% of the total available marks will have been deducted.

The Penalty does not apply to Pass/Fail Modules, i.e. there will be no penalty for late submission if assessments on Pass/Fail are submitted up to 1 working day (24 hours) after the published hand-in deadline.

Coursework submitted more than 1 day (24 hours) after the published hand-in deadline without approval will be marked as zero but will be eligible for referral. The reassessment should where appropriate, and as determined by the Module Leader, be the same method (e.g. essay) but maybe with a different task (e.g. different essay title) or with the same task (e.g. the same essay title) as indicated in the Module handbook. 

In modules where there is more than one assessment component, Students are not required to complete all assessment components if an overall Pass Mark (40% UG, 50% PGT) has been achieved. 

The only permitted exception will be in cases where the University is prevented from doing so by a PSRB requirement. In the case of PSRB requirements, a variation order will be required from the regulations. 

In modules, where there is more than one assessment component and an overall pass mark has not been achieved, Students will be eligible for a referral* in the individual failed module and/or not attempted component(s) of assessment.

These provisions apply to all assessments, including those assessed on a Pass/Fail basis.

The full policy can be found here 

Word limits

The word count is to be declared on the front page of your assignment and the assignment cover sheet.  The word count does not include:

The following word counts will not be included e g. appendices, glossary, footnotes, tables and references

Please note, in text citations [e.g. (Smith, 2011)] and direct secondary quotations [e.g. “dib-dab nonsense analysis” (Smith, 2011 p.123)] are INCLUDED in the word count.

If this word count is falsified, students are reminded that under ARTA this will be regarded as academic misconduct.

For those assessments where students are required to keep to the word limit, it is proposed that they should be informed that the marker will stop reading at the point when they judge that the word limit exceeds the recommended word count by more than 10%.  The marker will indicate the point at which they stop reading on the text.  

Students must retain an electronic copy of this assignment (including ALL appendices) and it must be made available within 24hours of them requesting it be submitted.

The full Word Limit Policy is available here

Group Work

The group work policy can be found here

Assessment criteria

Completely insufficient

Insufficient

Satisfactory

Good

Very Good

Excellent

 

0-39%

40-49%

50-59%

 

60-69%

70-79%

80-100%

Abstract & Int

No efforts have made to expose the research aspect

No efforts have made to expose the research aspect

normal efforts which do not show the whole picture of the development

Good efforts made to brief abstract

Very good understanding about the progress made in the development of the paper topic

Excellent brief about the progress made in the development of the paper topic

Lit Review

Insufficient details about the current and previous work have been presented

Insufficient efforts and attempt about the current and previous work have been presented

Satisfactory efforts made to explain the core subject domain with less example and research acumen

Good explanation of the core subject with good view of the problem domain

Very good  explanation of the current and previous attempts and authors work towards the topic and knowledge domain

Excellent and deep explanation of the current and previous attempts and authors work towards the topic and knowledge domain

Technical Bg

 

No efforts have been done at all

No sufficient attempt and efforts have been done so far

Adequate details have been presented about the security technical background and more in depth details are missing

Good efforts has been placed to explain the technical background about the problem domain

Very Good efforts has been placed to explain the technical background about the problem domain

Excellent details and deep understanding about the security issues and problem domain has been presented, in addition to the technical issues, design and architecture aspects has been discussed

RiskAssess

 

insufficient efforts made to highlight the impact on the functional aspects

No sufficient efforts and attempt made to highlight the impact on the functional aspects

Adequate explanation has been made to highlight the important impact on the operation

Good explanation has been made to highlight the important impact on the operation

Very Good efforts have been made to analyse the expected risks and its impact on the security operations

Excellent efforts and deep understanding have been done to highlight the vital stages of the Risk assessment and very good explanation has been made to avoid any unexpected events against the suggested model/design

Recommendation

No Sufficient  recommendations have been suggested which misses the new aspects and features of the proposed theory/idea

Insufficient recommendations and attempts have been suggested which misses the new aspects and features of the proposed theory/idea

Adequate recommendations have been suggested which misses the new aspects and features of the proposed theory/idea

Good efforts and a developing design has been recommended to overcome the traditional aspects of the current vulnerabilities

Very good effort has been made to suggest and recommend a developed design with new aspects to solve the current vulnerability

Excellent efforts has been done to highlight the vital stages of the Risk assessment and very good explanation has been made to avoid any unexpected events against the suggested model/design

Conclusion

No sufficient conclusions and pragmatic ideas have been presented to develop the solution

No sufficient conclusions and realistic ideas have been presented to develop the solution

fair conclusions and some random practical ideas have been presented to develop the current solution

Good conclusions and some random practical ideas have been presented to develop the current solution

Very good conclusions and deep understanding with good idea have been presented to develop further the suggested design or model

Clear conclusions and brilliant Idea has been suggested to develop the solution in the future with very good functionalities...etc.

References

No ref has been used at all

No sufficient references have been inserted for such an important subject

Adequate references have been inserted for such an important subject

Good and  sufficient references have been inserted for such an important subject

Very good references have been inserted

Excellent references have been used and very good in text citation has been inserted

Assessment Guidance Session

Detailed assessment guidance will be given in Week 3 Seminar/lecture.  The Seminar/lecture will provide advice on 

1.Overview of the module learning objectives and align them with a good study plan 
2.How to understand the requirements of the given Wireless security issues.
3.How to conduct/ research further reading about wireless security vulnerabilities
4.how the assessment will be graded against the rubric
5.How to submit the reports( both A1 &A2) and using NU IT system and not miss the deadline.   
You are reminded that recorded assessment guidance will be provided on the eLP Blackboard site for this module after Week 3 Seminar. 

Use of Generative AI within this Assessment

In alignment with Northumbria University’s Academic Regulations for Taught Awards (ARTA), section 1.2, you are reminded that “In all assessed work students should take care to ensure that the work presented is their own and that it fully acknowledges the work and opinions of others”.
Unless the assessment specific guidance above requests that you use generative AI in crafting your assessment, AI should not be used to do the core work for you.  You should assume that generative AI may be used as follows:

  • AI can help with things like improving grammar, helping with structure format, organising ideas, and generating suggestions. 
  • The main content, analysis, and conclusions in your work must always be your own work

Further guidance regarding using AI responsibly and ethically can be found in your student portal here. 
When you submit your assessment, you will be requested to add and sign a declaration of your use of AI in the creation of your work.  A copy of this declaration document is attached to the end of this document.  You should place this signed copy at the front of your submission.  Failure to accurately record your use of such tools may be considered as academic misconduct.

Academic Regulations

As part of the preparation for writing your assessment, you should familiarise yourself with the following policies, all of which can be found here:

  • Academic Regulations for Taught Awards (ARTA)
  • Academic Misconduct
  • Word Limit
  • Late Submission of Work
  • Short Extensions
  • Personal Extenuating Circumstances (PEC)
  • Technical Extenuating Circumstances (TEC)
    Please see the module Blackboard site/eLP for further details of how the University Assessment Regulations may affect/support you.

Order Custom Answers for LD7008 Wireless Networks and Security Assessment 2

Order Non Plagiarized Assignment

Are you a student in UK struggling with your LD7008 Wireless Networks and Security Assessment 2 at Northumbria University? Look no further! Our UK assignment help makes your academic journey easier. We provide clear explanations, well-researched content, and supportive guidance tailored to your needs. To further assist your learning, we also share a list of free assignment examples and samples, giving you a clear understanding of formatting, analysis, and academic standards. With our user-friendly approach, you can successfully complete your assignments and improve your overall academic performance.

Click here to see all Northumbria University assignment samples

Workingment Unique Features

Hire Assignment Helper Today!


Latest Free Samples for University Students

MSc Management Principles of Management Assignment Sample Answer

Category: Assignment

Subject: Management

University: BPP Business School

Module Title: Principles of Management

View Free Samples

ACC217 Accounting Information Systems Assignment Sample | SUSS

Category: Assignment

Subject: Accounting

University: Singapore University of Social Sciences | SUSS

Module Title: Accounting Information Systems (ACC217)

View Free Samples

ACC210 Accounting for Decision Making and Control Assignment Answers SUSS

Category: Assignment

Subject: Accounting

University: Singapore University of Social Sciences (SUSS)

Module Title: ACC210 Accounting for Decision Making and Control

View Free Samples

BUS105 Statistics Assignment Sample Solution Docx | SUSS

Category: Assignment

Subject: Business

University: Singapore University of Social Sciences

Module Title: Statistics (BUS105)

View Free Samples

MKT542 Digital Marketing Analytics Assignment Sample Answer

Category: Assignment

Subject: Marketing

University: Singapore University of Socical Sciences

Module Title: MKT542 Digital Marketing Analytics

View Free Samples
Online Assignment Help in UK