The current network architecture for the Data Mart that is under operation has the following design and instantiated diagram of the communication between the departments. This network topology does not incorporate a firewall which is aimed at solving the problem regarding security access on the franchise servers.
The above diagram showcases the current network is open without access restriction since it has encouraged multiple privileges to numerous users which stand the risk of access from unwarranted and authorized system users to particular sensitive information. An improvised and secure architecture is therefore advisable to categorize the different users who have access to system information and to what level of data manipulation they are allowed to perform. The user privileges and permission are vital in keeping a system safe while auditing it.
The proposed system architecture with the improvised security measures involving the installation of a firewall are integrated as exemplified in the illustration figure as shown.
The firewalls are supposed to be placed right in the middle of the router and the network switch before connecting to the network end devices. It will aid in the filtering out of the unwarranted access after appropriate configuration to increase the system network security.
Privileges needed for the various roles:
User- can only view/read data that are stored on the various servers that has granted them permission for conducting those operations.
Power User- has the ability to view and manipulate he a data and information stored on the computer servers to a certainly a particular permissive level only.
The administrator- the system admin has all the ultimate responsibilities and has access to all information and data log files that are conducted and commanded on the companies system.