When star topology is used all the computers are connected to a central device which provides more resilience to the network. Star topology is the most common form of network topology. Star topology is common and convenient because all the terminals on the network are connected by one central device. This makes it easy to add terminals or make changes to existing terminals because the entire network doesn’t have to be shut down. If changes are needed on one terminal the remaining terminals on the system can function normally. One main downside of using star topology is that if the main hub goes down the rest of the network cant function. A security officer can mitigate downtime, data loss, and breach by making sure the proper backup systems and protocols are in place and tested regularly. Another way to help mitigate data loss if the main hub goes down is to make sure that only those individuals who are authorized and with the correct credentials are working on restoring the system and making the repairs.
In a ring topology, all the computers are connected in a circular format. Each computer will have two “neighbors” that they share data with. The computers are all connected by a unidirectional transmission link and the cable is in a closed loop. One downside of using a ring topology is that if one computer experiences a problem, all the other computers on the ring can be affected negatively. A security officer can help to mitigate data loss by making sure the correct backup devices and protocols are in place. The backup devices can be on-site, off-site, or even cloud-based devices. Another way that a security officer can help to mitigate loss is by using dual concentric rings. By using dual rings one terminal can fail while allowing the rest of the terminals to function properly.