Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.​​​​​
Designing a Comprehensive Security Strategy
This document relates to the objective by outlining key hardware, network, and security components in Starbucks’ infrastructure. It discusses firewalls, encryption, endpoint protection, and incident response, which support secure communication and external connections. The focus on risk assessment and regulatory compliance ties directly to maintaining operational and network security.
Click Image to Download
IoT Device Security Analysis Report – ZoeTouch Smart Scale
This document supports the objective by analyzing hardware and communication systems in an IoT device. It identifies BLE connections, firmware vulnerabilities, and encryption methods, showing how addressing and secure design protect networked devices from external threats.
Click Image to Download
Starbucks Physical Security Assessment
This report connects to the objective by emphasizing physical security controls that protect network hardware. It covers access control, surveillance, alarms, and barriers, which safeguard network equipment and ensure reliable physical connectivity. These measures help maintain the integrity and availability of the network’s infrastructure.
Click Image to Download



