OCU C)ISSO A Discussion Lesson 09
- This topic has 9 replies, 8 voices, and was last updated 1 week, 5 days ago by
Trae Johnson.
-
AuthorPosts
-
-
November 1, 2024 at 1:18 pm #99323
Manny Varela
KeymasterIn reviewing the challenges of different topologies, choose two types of topologies and discuss how a security officer could work with these challenges so that they minimally affect the company.
-
November 26, 2025 at 2:19 pm #111495
Carlos Martes
ParticipantWhen reviewing network topologies, two common types that present challenges are the bus topology ands the star topology. In a bus topology, every de shares the same communication line. This creates a security risk because a single compromised device or cable break can disrupt the entire network. Top work with this challenge, a security officer should enforce strong endpoint protection, continuous monitoring, and proper cable management. They can also implement segmentation and encryption sop data on the shred line is less vulnerable if intercepted. In a star topology, all devices depend on a central switch or hub. If that central device fails, the network goes down. A security officer can address this by ensuring the central switch is physically secured, regularly patched and, monitored for suspicious activity. Adding redundancy such as back up switch or failover systems, also minimizes downtime. By focusing on prevention and resilience, the company stays protected with minimal disruption.
-
November 28, 2025 at 10:37 am #111522
Isabelle Tubbs
ParticipantHi, Carlos. Your overview of protecting systems with bus or star topologies shows just how important it is to keep them secure. These topologies can be efficient, but each topology is only as strong as its weakest point. Thus, a security officer’s job is to make it strong by protecting those weak points.
-
-
November 27, 2025 at 2:01 pm #111511
Mjulius513
ParticipantWhen examining the challenges of different network topologies, two common examples are bus topology and star topology. A bus topology is simple and inexpensive to set up, but it has some issues. If the main cable breaks, the entire network can stop working. Additionally, because all devices share the same cable, it is easier for someone to see or steal data. A security officer can help by ensuring the cable is checked regularly, repairing any damage promptly, and using basic encryption to protect the data on the cable.
A star topology performs better, but it also has a significant weakness. All devices connect to a central switch or hub. If that main device fails, the entire network can go down. To minimize this risk, the security officer can ensure the switch is kept in a secure room, updated frequently, and monitored with appropriate tools. They can also implement a backup switch to keep the network running if something goes wrong. These steps help the company prevent major problems.
-
December 1, 2025 at 3:41 pm #111581
Carlos Martes
ParticipantHello Julius,
You made solid points about both topologies. I agree that bus networks are cheap but too vulnerable, and star networks are stronger yet depend heavily on the switch. Your focus on security checks, updates and backups is right on, and those steps really do reduce risk and keep things running reliably. -
December 1, 2025 at 10:25 pm #111616
Trae Johnson
ParticipantYou’ve clearly outlined the weaknesses of bus and star topologies. In the case of a bus network, regular checking of the main cable and the use of encryption are practical ways to reduce the chance of data exposure or failure of the network. In star topologies, securing the central switch and having a backup device is an excellent measure that ensures network availability. Your approach underlined the fact that through preventive security measures, operational risks could be minimized considerably.
-
-
November 28, 2025 at 10:30 am #111521
Isabelle Tubbs
ParticipantRing topologies allow computers to connect with a transmission link headed in one direction, allowing the cable to operate in a closed loop. The problem with ring topologies is that if one of the stations experiences an issue, it could affect the rest of the computers that are on the ring in a negative way. To take action against this problem, a security officer can implement a dual concentric ring, which leaves some room open for one terminal to fail without hurting the system too much.
Star topologies involve connection all the computers to a central device. This feature provides resiliency to the system. However, the central device is also the single point of failure. If it is affected, the rest of the system will be too. A security officer should place special importance on maintaining the security of this central device by using the right controls/measures so that the system does not fail as easily.-
November 30, 2025 at 6:45 am #111552
Mjulius513
ParticipantHi Isabelle, you explained the strengths and weaknesses of ring and star topologies very clearly. I like how you pointed out that a dual concentric ring can reduce failures in a ring setup, while the star topology depends heavily on its central device. Protecting that main device is important to keep the whole network running safely and reliably.
-
December 1, 2025 at 10:25 pm #111615
Trae Johnson
ParticipantThe way you identified the risks for ring and star topologies. The idea of using a dual concentric ring is brilliant as it keeps the network up and running even when one node fails. In regards to the star topologies, it’s important to focus on the security and maintenance of the central device, preventing single points of failure from taking down an entire network segment. In this regard, both are planned strategies that reduce downtime and keep the network safe.
-
-
December 1, 2025 at 9:03 pm #111612
Trae Johnson
ParticipantTwo widely used network topologies that pose their own sets of security challenges include the ring topology and the bus topology. In a ring topology, each computer is connected in a circular loop, such that data travels in one direction from device to device. The major challenge is that any single-device failure or connection may cause disruption to the entire network. A security officer can address this by implementing redundant rings or backup paths, monitoring the network for failures, and ascertaining that procedures for quick response are set up in order to maintain connectivity and protect the flow of data.
In a bus topology, all devices share a single communication line. The simplicity of such a setup makes it cheap; at the same time, it means that a failure in one cable may bring down the whole network. Furthermore, since data travels along the same line, access to intercepting information by unauthorized users is easier. The security officer can mitigate these by physically securing cables, performing regular inspections, and implementing encryption or secure communication protocols to protect data from eavesdropping. Both approaches show that proactive planning and monitoring are essential in minimizing security risks associated with topologies.
-
-
AuthorPosts
- You must be logged in to reply to this topic.