Mile2 Cybersecurity Institute

Reply To: OCU C)ISSO A Discussion Lesson 09

#111495
Carlos Martes
Participant

When reviewing network topologies, two common types that present challenges are the bus topology ands the star topology. In a bus topology, every de shares the same communication line. This creates a security risk because a single compromised device or cable break can disrupt the entire network. Top work with this challenge, a security officer should enforce strong endpoint protection, continuous monitoring, and proper cable management. They can also implement segmentation and encryption sop data on the shred line is less vulnerable if intercepted. In a star topology, all devices depend on a central switch or hub. If that central device fails, the network goes down. A security officer can address this by ensuring the central switch is physically secured, regularly patched and, monitored for suspicious activity. Adding redundancy such as back up switch or failover systems, also minimizes downtime. By focusing on prevention and resilience, the company stays protected with minimal disruption.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.