Mile2 Cybersecurity Institute

OCU C)ISSO A Discussion Lesson 09

Viewing 4 reply threads
  • Author
    Posts
    • #99323
      Manny Varela
      Keymaster

      In reviewing the challenges of different topologies, choose two types of topologies and discuss how a security officer could work with these challenges so that they minimally affect the company.

    • #111495
      Carlos Martes
      Participant

      When reviewing network topologies, two common types that present challenges are the bus topology ands the star topology. In a bus topology, every de shares the same communication line. This creates a security risk because a single compromised device or cable break can disrupt the entire network. Top work with this challenge, a security officer should enforce strong endpoint protection, continuous monitoring, and proper cable management. They can also implement segmentation and encryption sop data on the shred line is less vulnerable if intercepted. In a star topology, all devices depend on a central switch or hub. If that central device fails, the network goes down. A security officer can address this by ensuring the central switch is physically secured, regularly patched and, monitored for suspicious activity. Adding redundancy such as back up switch or failover systems, also minimizes downtime. By focusing on prevention and resilience, the company stays protected with minimal disruption.

      • #111522
        Isabelle Tubbs
        Participant

        Hi, Carlos. Your overview of protecting systems with bus or star topologies shows just how important it is to keep them secure. These topologies can be efficient, but each topology is only as strong as its weakest point. Thus, a security officer’s job is to make it strong by protecting those weak points.

    • #111511
      Mjulius513
      Participant

      When examining the challenges of different network topologies, two common examples are bus topology and star topology. A bus topology is simple and inexpensive to set up, but it has some issues. If the main cable breaks, the entire network can stop working. Additionally, because all devices share the same cable, it is easier for someone to see or steal data. A security officer can help by ensuring the cable is checked regularly, repairing any damage promptly, and using basic encryption to protect the data on the cable.

      A star topology performs better, but it also has a significant weakness. All devices connect to a central switch or hub. If that main device fails, the entire network can go down. To minimize this risk, the security officer can ensure the switch is kept in a secure room, updated frequently, and monitored with appropriate tools. They can also implement a backup switch to keep the network running if something goes wrong. These steps help the company prevent major problems.

      • #111581
        Carlos Martes
        Participant

        Hello Julius,
        You made solid points about both topologies. I agree that bus networks are cheap but too vulnerable, and star networks are stronger yet depend heavily on the switch. Your focus on security checks, updates and backups is right on, and those steps really do reduce risk and keep things running reliably.

      • #111616
        Trae Johnson
        Participant

        You’ve clearly outlined the weaknesses of bus and star topologies. In the case of a bus network, regular checking of the main cable and the use of encryption are practical ways to reduce the chance of data exposure or failure of the network. In star topologies, securing the central switch and having a backup device is an excellent measure that ensures network availability. Your approach underlined the fact that through preventive security measures, operational risks could be minimized considerably.

    • #111521
      Isabelle Tubbs
      Participant

      Ring topologies allow computers to connect with a transmission link headed in one direction, allowing the cable to operate in a closed loop. The problem with ring topologies is that if one of the stations experiences an issue, it could affect the rest of the computers that are on the ring in a negative way. To take action against this problem, a security officer can implement a dual concentric ring, which leaves some room open for one terminal to fail without hurting the system too much.
      Star topologies involve connection all the computers to a central device. This feature provides resiliency to the system. However, the central device is also the single point of failure. If it is affected, the rest of the system will be too. A security officer should place special importance on maintaining the security of this central device by using the right controls/measures so that the system does not fail as easily.

      • #111552
        Mjulius513
        Participant

        Hi Isabelle, you explained the strengths and weaknesses of ring and star topologies very clearly. I like how you pointed out that a dual concentric ring can reduce failures in a ring setup, while the star topology depends heavily on its central device. Protecting that main device is important to keep the whole network running safely and reliably.

      • #111615
        Trae Johnson
        Participant

        The way you identified the risks for ring and star topologies. The idea of using a dual concentric ring is brilliant as it keeps the network up and running even when one node fails. In regards to the star topologies, it’s important to focus on the security and maintenance of the central device, preventing single points of failure from taking down an entire network segment. In this regard, both are planned strategies that reduce downtime and keep the network safe.

    • #111612
      Trae Johnson
      Participant

      Two widely used network topologies that pose their own sets of security challenges include the ring topology and the bus topology. In a ring topology, each computer is connected in a circular loop, such that data travels in one direction from device to device. The major challenge is that any single-device failure or connection may cause disruption to the entire network. A security officer can address this by implementing redundant rings or backup paths, monitoring the network for failures, and ascertaining that procedures for quick response are set up in order to maintain connectivity and protect the flow of data.

      In a bus topology, all devices share a single communication line. The simplicity of such a setup makes it cheap; at the same time, it means that a failure in one cable may bring down the whole network. Furthermore, since data travels along the same line, access to intercepting information by unauthorized users is easier. The security officer can mitigate these by physically securing cables, performing regular inspections, and implementing encryption or secure communication protocols to protect data from eavesdropping. Both approaches show that proactive planning and monitoring are essential in minimizing security risks associated with topologies.

Viewing 4 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.