Reference no: EM133272408
Scenario - Coffee! Pty Ltd, is a growing small cafe business that is opening a second site. The company started at a single location and will now be adding a second cafe. In addition, ordering was previously in person only but with this additional site, they'd like to add an online ordering system that is consistent across both locations and store customer profiles.
As they prepare for the transition, they have been contemplating hiring a security consultant to advise on their network set up. Your consulting service steps forward to provide them a solution.
Here are the list of devices and assets that the company already has on their local network:
1. Each location has two PoS systems which handle payments (4 total). These include a payment card reader and receipt printer.
2. Wireless internet access for customers.
3. Two laptops.
4. A database of client details, information on inventory and suppliers stored locally on one of the laptop's with a backup on an external hard drive.
5. Sensitive company documents like payroll information, invoices and accounting files stored locally on one of the laptop's with a backup on an external hard drive.
Some client details must be kept secure (such as payment details and personal information).
The company has recently hired three new employees to staff and manage the second location. The employees can access some client data but only managers can access the sensitive company documents.
Question -
1. Draw and display a network architecture for the company's network that supports the existing devices and storage needs for their data assets. You must add other network components like webservers, database servers, routers, switches, firewalls, and any other network devices that will help with their cybersecurity objectives. The resources can be located on the company's premises or in the cloud.
2. Referencing the network diagram, explain to the founders in professional, jargon free English why you propose this architecture for their network. Explicitly highlight the importance of each network component that was introduced for security.