Reply To: OCU C)ISSO C Discussion Lesson 09
Two topologies that I would choose would be the Hybrid topology and the Ring topology. The Hybrid topology is a network structure that is known and used to connect the different topologies together in order to create another network structure. For the security officers, they can work through the challenges of a hybrid topology by using or having a consistent security system, they also can and should be working on improving the visibility that they have over the different environments needed and used. The security officers must be able to see clearly and have a clear line of sight over all of their responding resources that are on both, the premises and the cloud. These are both required from the security officers so that they can respond to different threats over the access controls as well as the incident protocol.
Next is the Ring topology and this one is the use and work of connecting different devices together in a circular formation, but each device must be connected to two other devices for this topology to work and function correctly. This topology is also used to transmit the data to go in one direction around the ring until it finally reaches the point at which it needs to be. This kind of topology is also an easier one to use. Security officers can work with the challenges of a ring topology if they focus on the security of each node and also by assuming their data’s encryption. The security officers should also be aware of their data flow that is in a ring topology.