ISSC641 discussion response

ISSC641 discussion response.

I’m stuck on a Computer Science question and need an explanation.

I need a response to the below two students response. Each response should be at least 150 words, APA format.

Student one:

What is the difference between a physical network and a logical network?

Networks are comprised of various components working together to create both physical, and logical structures, which work together to provide the necessary level of service expected by the user. The differences between the physical and logical constructs are pretty obvious. The physical topology of a network refers to the physical connections, i.e. the wires and cables used to create a physical link between devices or structures. (PCMag, 2020) The logical topology is how the devices appear to be connected to the user, or in other words, how the data within the system flows between various nodes, somewhat independent of the physical cabling itself. (Munezero, 2019)

What is a security control?

When talking in terms of security, assets, risks etc, the subject of a security control is likely to come up. Security controls are essentially those countermeasures used to reduce risk to a stake holder. A more granular look at the term might reveal that there are certain sub-categories within the overall umbrella of security controls, such as physical controls (i.e. CCTV system), technical controls (i.e. encryption) and administrative controls (i.e. onboarding/offboarding procedures). (MIT, 2020) As a whole, though, the various safeguards and countermeasures put in place to reduce the likelihood of a negative or unwanted event or outcome would adequately define “security controls”.

MIT. (2020). 1.2. Security Controls. Retrieved from

Munezero, D. (2019, July 3). Difference Between Physical and Logical Topology (with Comparison Chart). Retrieved from

PCMag. (2020). Definition of logical vs. physical topology. Retrieved from…

Student two:

What is authentication and how does it differ from authorization?

Authentication is validating users access, to ensure they are valid users to access systems, information or domains. Passwords are actually one of the most common way a user can validate there access. With the correct password a user can gain access into a system. New technology has required users to have multi-factor authentication (MFA) to give users access, with MFA a user maybe required to enter a additional security code or pin using the MFA process. Authorization is giving a user permission to access the system before a password is given to validate the users access. For example a user account needs to be created first before a user can have access and when there account is created a password is generated to allow the user access to the system.

Why would there be a need for remote data access?

Remote data access is needed if for example your work offsite say your traveling or if you work from home you would need access to your organizations network to view the data within your network to perform your job. Some remote data cloud applications are OneDrive, Sharepoint which some organizations have locked down meaning you can only access the data if your connected via a VPN access to ensure your data is not being hacked during transmission. If your a network administrator you may not have the means to visit a server daily so remote access to the server is key so you can perform your work on the server remotely.

Thank You


Authentication vs. Authorization. (2019, November 11). Retrieved from…

ISSC641 discussion response

"Looking for a Similar Assignment? Order now and Get a Discount!