Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In this scenario, E - Tat Marketplace is a startup company providing a digital marketplace for preowned goods. The usage of the platform has increased
In this scenario, ETat Marketplace is a startup company providing a digital marketplace for preowned goods. The usage of the platform has increased significantly, so they are looking to invest in a larger and more secure network. They have hired you as a security consultant to design them a new secure network from scratch.
Task
You are required to carefully analyze these designs and identify and explain five security weaknesses within this design. For each weakness, you need to include the following:
A snippet of the respective network design annotations are encouraged demonstrating the area of the design being discussed.
A detailed explanation of the issue.
A detailed explanation of the potential impacts.
Task
ETat Marketplace has asked you to design a new network from scratch for their business. This new design should be based on the provided requirements ONLY no inclusion of existing components is required You are to create a secure and resilient network design, and document this in a technically detailed, and professional report. The design can only utilise the approved hardware listed in Table it must fulfil all of the service requirements shown in Table and provide PCs for staff to use. The cost must be within the companys budget of
Table ETat Marketplaces Equipment List
Individual Device Cost
Storage server
GB
GB
GB
GB
Compute server
CPU
CPUs
CPUs
CPUs
Load balancer
Desktop PC
port switch
port switch
port switch
Security gateway
Network AntiVirus
Firewall
Router
IDS
IPS
Table Overview of Required Services
Service Required Required Accessed Notes
CPU Storage Externally
Capacity Capacity
GB
Selling Web App Y All data is stored on DB
Buying Web App Y All data is stored on DB
Admin Web App N Staff only, local application
Payment Gateway Y
SMTP N
CRM Web App N Staff only, local application
DB N
SIEM N Staff only, local application
VPN Y Only allows access to CRM and
SIEM
Active Directory N Serves in DS and LDS roles
Backup N
The following assumptions should be made in the development of your design:
ISP uplinks have been installed from different providers.
All necessary infrastructure hardware is in place eg CAT cabling, network wall jacks.
Externally hosting any service is not permitted.
Each server has a dual network interface card.
Any OS licence is included in the costs shown in Table
Only software included with the OS as standard, or open source software may be used.
Your professional report should be both detailed and technical, and must contain the following:
Design Overview
Explanation of the design principles followed.
Explanation of the network security considerations integrated into the design.
A financial breakdown of the design proposed.
Physical Network Design
Technical illustration of proposed physical network design
Descriptions of the designdecision made
Logical Network Design
Technical illustration of proposed logical network design
Descriptions of the designdecision made
Services
How each service will be deployed eg standalone, colocated, virtualised
A recommendation of the software used to implement the services
You required to design:
Security Analysis
Identification of suitable design weakness x
Appropriate diagram snippet x
Explanation of suitable design weakness x
System Design Report
Financial Breakdown
Logical Diagram
Logical Explanation
Physical Diagram
Physical Explanation
Service Implementation
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started