Reply To: OCU ISSO D Week 03 Lesson 09 Discussion

Kelly Crooks

When star topology is used all the computers are connected to a central device which provides more resilience to the network. Star topology is the most common form of network topology. Star topology is common and convenient because all the terminals on the network are connected by one central device. This makes it easy to add terminals or make changes to existing terminals because the entire network doesn’t have to be shut down. If changes are needed on one terminal the remaining terminals on the system can function normally. One main downside of using star topology is that if the main hub goes down the rest of the network cant function. A security officer can mitigate downtime, data loss, and breach by making sure the proper backup systems and protocols are in place and tested regularly. Another way to help mitigate data loss if the main hub goes down is to make sure that only those individuals who are authorized and with the correct credentials are working on restoring the system and making the repairs.

In a ring topology, all the computers are connected in a circular format. Each computer will have two “neighbors” that they share data with. The computers are all connected by a unidirectional transmission link and the cable is in a closed loop. One downside of using a ring topology is that if one computer experiences a problem, all the other computers on the ring can be affected negatively. A security officer can help to mitigate data loss by making sure the correct backup devices and protocols are in place. The backup devices can be on-site, off-site, or even cloud-based devices. Another way that a security officer can help to mitigate loss is by using dual concentric rings. By using dual rings one terminal can fail while allowing the rest of the terminals to function properly.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!