Identify and address any other security concerns

Assignment Help Computer Network Security
Reference no: EM131512836

Coffee and Company Security Case Study

Your client runs 4 coffee house locations in a single college town. For ease of management and expansion, the shops are all provisioned with a common set of foodservice and IT equipment, but each location has a unique theme applied for the décor. When the wireless network was deployed at the original location, the managers there started to maintain a presence in the public area of the store and circulating with the customers, they didn't stay "cooped up" back in the office. The name of the shop was changed to represent the "community feel" that this generated and which is now a hallmark of the "Coffee and Company" experience. Each manager is encouraged to put their own "stamp" on the flavor and décor of their store. Stores are referred to by clients, management and employees by nicknames relating to the décor - e.g the Green store, the Glass store, the Beach store, etc. To keep things fresh, stores are redecorated regularly, so a single store may have many identifiers depending on when a customer started coming or when an employee was hired.

Each store has a manager's office which is physically separate from the food preparation and customer service areas, but to which all employees are allowed physical access. The manager's office at the original location also serves as "corporate headquarters" for record keeping and IT purposes. Working files from this computer are copied to a USB hard drive to protect against file loss. Many of the choices that are currently in place were decided upon years ago and have simply been recreated as additional sites were brought online. There is currently no formal process in place for measuring network performance or evaluating the reliability or security of the network or of IT operations.

The company has purchased a "business bundle" of Internet access, telephone service, and cable TV from the local ISP. Managers in each location use FTP through the internet connection to upload sales and inventory information a folder on the "server" at the headquarters office which is really just a set of shared folders on that manager's computer named by store decor. All locations have a consumer-grade broadband router/firewall with a single wireless network configured. This network provides connectivity for the 2 thin-client based point-of-sale cash registers and a computer in the manager's office which hosts the point of sale application and is used for record keeping and scheduling of staff at that location. The wireless network also provides Internet access for customers of the coffee shop. For consistency between stores, the network is set to support 802.11 b and g clients, and uses a WEP key which is printed on all receipts and prominently posted for the convenience of the customers. The same key is used in all locations so that customers have easy access to the Internet from whichever location they happen to be visiting.

Each location manages their own employees' schedules and accounts in the scheduling and point of sales systems. Much of the workforce is made up of college students, some of whom work seasonally, work at multiple stores, and who may drop or add to their desired number of shifts based on their course load. Many long-time employees know each other's' access codes for the point of sale system. Sometimes when the shop gets busy, servers enter orders, payments, and tips for each other in the point of sale system. While this does sometimes help service customers more quickly, it has led to some problems appropriately managing the distribution of tips and sales commissions.

Customers were complaining that access speeds for the Internet have been slow at several locations, so the speed of the connection at all the locations was increased, but the responsiveness of the network has not improved much, if at all. Some customers are hesitant to make use of the network due to performance concerns or because their new devices won't connect, others have expressed concerns about data security.

Recently, a fire in a neighboring business required an evacuation of the headquarters location. While all store locations are in compliance with applicable building codes and have passed safety inspections (fire suppression, emergency lights, etc.), power was lost and due to the possibility of structural damage both the coffee house location and the management office were closed and inaccessible for several business days. During this time transactions from the other shops could not be uploaded as the headquarters computer was not accessible - no one could get to it to boot it up after power was restored. Once the location was brought back online, after a couple of days all transactions eventually sync'ed up.

The original owner of the chain has recently entered "semi-retirement" and is turning daily operations over to her daughter. The daughter has recently received a new set of standards from their credit card processing company and feels that it may be time to re-examine the IT infrastructure and the security of the current network. She has requested that you prepare a report detailing the current solutions that are in place and compare them to currently accepted practices. Where the current solution is not up to standards, she requests that you provide a recommendation to correct the situation. She has articulated the following goals. Those marked with an asterisk are conditions of the credit card payment processing contract and are non-negotiable.

- *Credit Card transaction processing traffic may not be transmitted wirelessly

- *Credit Card transaction processing traffic must be on a separate network from customer internet traffic

- Free customer wireless access must support modern laptops, netbooks, tablets, and smartphones

- There needs to be a way to track who is using the wireless bandwidth, both for performance tuning and marketing promotions (e-coupons for frequent surfers, etc.)

- Customers must feel confident using the network for shopping and finance transactions as well as for casual surfing and email use

- The store managers need the ability to access managerial information within the store while circulating with the customers

- Interruptions at any one location should not impact operations at any other location. The centralizing of inventory and sales information has been working very smoothly, but having it out of reach for several days should not happen again.

- Since personnel often move between store locations, point-of-sale and scheduling operations should be integrated across all the stores.

- There should be no question as to which store a particular record or report refers

- All sales and service transactions must be entered by the responsible server. It must be impossible for servers to access each other's accounts in the point of sale system.

- There is no plan to establish a permanent IT staff position. The current "parallel design" is comfortable and allows for simplified management as all stores are the same. The customer would like to see this continue.

- Proposed changes should tighten up security and operational reliability, but not change the customer experience or ambiance of the stores

- Identify and address any other security concerns. The client realizes that her expertise is in coffee and hospitality - she's looking for expert professional guidance in your area of expertise.

Reference no: EM131512836

Questions Cloud

Evaluate speeds of dsl and cable modem that you researched : Compare and evaluate the speeds of DSL and cable modem that you researched. evaluate the cost of DSL and cable modem that you researched.
Savings account at an annual interest rate : If you invest $1,000 into a savings account at an annual interest rate of 5% (APR), compounded semi-annually, how much will you have in the savings account.
Create an entity-relationship diagram for the scenario : create an entity-relationship (E-R) diagram for the scenario that you selected from Hands-On Database and based on the information you produced.
Prepare a international business report : Having now completed a major analysis of environment in which your business will operate you will need to prepare Part 2 of your International Business Report
Identify and address any other security concerns : Identify and address any other security concerns. The client realizes that her expertise is in coffee and hospitality
Comparative advantage in producing : What are some examples of goods that the United States has comparative advantage in producing?
What is the present value of the payments : The interest rate is 5% now and increases to 8% in the next year. What is the present value of the payments?
What was the bigger issue here : What was the "bigger" issue here? Who was for Apple complying, and, who was against? What were each side's reasoning?
Research a real life business example : HC1041 Assessment - Impact of IT on Business. You are to research a real life business example of your choice and the impact of IT on that business

Reviews

len1512836

5/31/2017 3:57:38 PM

Assignment Max Points All 13 bulleted Items are addressed in Detail 75 Conditions of the Credit Card Processing are addressed in Detail (*asterisks) 15 Tabular Report provided per requirement 5 Mid Term Case Study adheres to APA formatting No Spelling/Grammatical Errors 5 POINTS 100

len1512836

5/31/2017 3:57:25 PM

This is a report, I am working on another one. This report is on finding a better solution dealing with customer, wifi, management, etc. Functional Goal Technical Requirement Current Solution Proposed Solution Credit Card Processing A Must not be wireless Inadequate Establish wired network drops for point-of-sale registers B Must be separate from customer traffic Inadequate Install router/firewall between customers and business networks Free, secure Internet Access for customers A 802.11b/g/n Wireless Network Adequate for coverage area but not for speed or security New access points supporting (enter security details here).

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd