Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this scenario, E - Tat Marketplace is a startup company providing a digital marketplace for preowned goods. The usage of the platform has increased

In this scenario, E-Tat Marketplace is a startup company providing a digital marketplace for preowned goods. The usage of the platform has increased significantly, so they are looking to invest in a larger and more secure network. They have hired you as a security consultant to design them a new secure network from scratch.
Task 1
You are required to carefully analyze these designs and identify and explain five security weaknesses within this design. For each weakness, you need to include the following:
A snippet of the respective network design (annotations are encouraged) demonstrating the area of the design being discussed.
A detailed explanation of the issue.
A detailed explanation of the potential impacts.
Task 2
E-Tat Marketplace has asked you to design a new network from scratch for their business. This new design should be based on the provided requirements ONLY (no inclusion of existing components is required). You are to create a secure and resilient network design, and document this in a technically detailed, and professional report. The design can only utilise the approved hardware listed in Table 1, it must fulfil all of the service requirements shown in Table 2 and provide 10 PCs for staff to use. The cost must be within the companys budget of 100,000.
Table 1. E-Tat Marketplaces Equipment List
Individual Device Cost
Storage server
250 GB 2600
500 GB 3700
750 GB 4300
2
1000 GB 5100
Compute server
1 CPU 2600
2 CPUs 3700
4 CPUs 4300
8 CPUs 5100
Load balancer 600
Desktop PC 420
8 port switch 90
16 port switch 200
24 port switch 350
Security gateway 130
Network Anti-Virus 750
Firewall 110
Router 170
IDS 250
IPS 300
Table 2. Overview of Required Services
Service Required Required Accessed Notes
CPU Storage Externally
Capacity Capacity
(GB)
Selling Web App 160 Y All data is stored on DB
Buying Web App 160 Y All data is stored on DB
Admin Web App 20 N Staff only, local application
Payment Gateway 8200 Y
SMTP 2100 N
CRM Web App 4100 N Staff only, local application
3
DB 10500 N
SIEM 410 N Staff only, local application
VPN 20 Y Only allows access to CRM and
SIEM
Active Directory 20 N Serves in DS and LDS roles
Backup 1500 N
The following assumptions should be made in the development of your design:
2 ISP uplinks have been installed from different providers.
All necessary infrastructure hardware is in place e.g. CAT6 cabling, network wall jacks.
Externally hosting any service is not permitted.
Each server has a dual network interface card.
Any OS licence is included in the costs shown in Table 1.
Only software included with the OS as standard, or open source software may be used.
Your professional report should be both detailed and technical, and must contain the following:
Design Overview
Explanation of the design principles followed.
Explanation of the network security considerations integrated into the design.
A financial breakdown of the design proposed.
Physical Network Design
Technical illustration of proposed physical network design
Descriptions of the design/decision made
Logical Network Design
Technical illustration of proposed logical network design
Descriptions of the design/decision made
Services
How each service will be deployed (e.g. standalone, co-located, virtualised)
A recommendation of the software used to implement the services
You required to design:
Security Analysis
Identification of suitable design weakness (x4)
Appropriate diagram snippet (x4)
Explanation of suitable design weakness (x4)
System Design Report
Financial Breakdown
Logical Diagram
Logical Explanation
Physical Diagram
Physical Explanation
Service Implementation

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions