OCU C)ISSO A Discussion Lesson 11
- This topic has 11 replies, 7 voices, and was last updated 1 day, 13 hours ago by
Joseph Doss.
-
AuthorPosts
-
-
November 1, 2024 at 1:11 pm #99319
Manny Varela
KeymasterThere are many CyberSecurity issues. Of the top 15, choose 3 to explain in detail. In these explanations, discuss how these are important to a security officer and company.
-
November 26, 2025 at 2:55 pm #111497
Carlos Martes
ParticipantThere are many cybersecurity issues today, but three major ones are phishing, malware and insider threats. Phishing is when attackers trick users through fake emails or messages or steal passwords or sensitive information. This is important for security officers because employees are often the weakest link, and training is needed to reduce these risks. Malware is harmful software such as viruses, ransomware and or spyware. A single infected device can shut down business operations or leak data. Security officers must implement antivirus tools, patch systems, and monitor for unusual activity to prevent infections. Insider threats happen when employees, contractors or others with access cause harm, either accidently or on purpose. This makes access control, logging and monitoring essential. Security Officers must understand user behavior, ensure least privilege access, and create policies that protect the company. By focusing on these three issues, a security officer can reduce major risks and keep the organization more secure.
-
November 30, 2025 at 2:20 pm #111555
Mjulius513
ParticipantYou explained these three cybersecurity issues very well. Phishing, malware, and insider threats are major risks for any company. Training employees, keeping systems up to date, and implementing strong access controls are key steps. By focusing on these areas, security officers can greatly reduce threats and help keep the organization safe.
-
-
November 27, 2025 at 4:00 pm #111515
Mjulius513
ParticipantCybersecurity has many issues, but three of the most important are phishing, ransomware, and insider threats. Phishing happens when attackers send fake emails or messages to trick people into sharing passwords or personal information. This matters for security officers because one wrong click by an employee can allow attackers into the company’s network. To prevent this, training and strong email filters are necessary. Ransomware is a type of malware that locks or encrypts company data and demands payment to unlock it. This can stop business operations. Security officers need to ensure the company has good backups, updated antivirus tools, and strong patching practices to avoid these attacks.
Insider threats happen when someone inside the company, either intentionally or accidentally, causes harm. This could be a worker misusing data or falling for a scam. Security officers must use access controls, monitoring, and employee training to reduce these risks.
-
December 1, 2025 at 3:48 pm #111585
Carlos Martes
ParticipantHello Julius,
You made strong points about phishing, ransomware and insider threats. I agree that these are huge risks, especially since one careless click can cause major damage. Your focus on employee training, strong filters, backups and monitoring is exactly right. Human mistakes are common, and solid security practices are essential to reducing those risks. -
December 1, 2025 at 5:34 pm #111600
Isabelle Tubbs
ParticipantHi, Mjulius. You highlighted how easily an attack can happen to a system, which ends up causing great damage to a system. Security officers do need to put measures and tools in place to prevent this, like the training, filtering, and monitoring you mentioned. This is how to prevent an easy mistake causing a great amount of damage.
-
December 1, 2025 at 11:12 pm #111623
Trae Johnson
ParticipantYou described phishing, ransomware, and insider threats very clearly. Your emphasis on employee training for preventing phishing is important; most attacks start with human mistakes. I also agree that strong backups and consistent patching are necessary defenses against ransomware. The way you connected insider threats to access control shows why monitoring user activity is such a vital responsibility.
-
-
December 1, 2025 at 3:47 pm #111583
Carlos Martes
ParticipantYou made strong points about phishing, ransomware and insider threats. I agree that these are huge risks, especially since one careless click can cause major damage. Your focus on employee training, strong filters, backups and monitoring is exactly right. Human mistakes are common, and solid security practices are essential to reducing those risks.
-
December 1, 2025 at 5:10 pm #111599
Isabelle Tubbs
ParticipantFrom the many cybersecurity issues that can arise on a system, a few are denial of service, SQL injecting, and malicious software.
Denial of Service takes the resources on a computer and makes the computer not respond to requests given to it by the user. A larger type of Denial of Service is Distributed Denial of Service, which uses the system it has affected to create the attack on other systems. Because this can be very damaging to a system, a security officer should prevent this by implementing measures that filter the packets that come in or out, depending on their source address.
SQL injecting is a way to insert code into a system to attack it. Security officers must maintain the system by using the tools that check and adjust what is entered into it so that the device does not accept malicious code.
Finally, malicious software can create some damage to a system’s resources and files, which is why security officers must run regular scans and put other security measures in place to prevent this.-
December 1, 2025 at 11:11 pm #111622
Trae Johnson
ParticipantYou explained denial of service and SQL injection pretty well. I find your argument on packet filtering for DoS attacks to be particularly salient, since early detection can indeed minimize mass disruption. Equally, I agree that periodic system checks and input validation are key in minimizing the occurrence of SQL injections. Your explanation of malicious software justifies well why routine scanning is an important duty of any security officer.
-
-
December 1, 2025 at 11:09 pm #111621
Trae Johnson
ParticipantThree major cybersecurity issues that continue to pose serious risks to organizations include ransomware, insider threats, and social engineering attacks. Security officers care deeply about each of these issues because they all have the potential to disrupt business operations, compromise sensitive data, and damage a company’s reputation.
Ransomware is considered one of the most disruptive kinds of cyberattacks due to its encryption of business data, which cannot be deciphered without payment of a ransom. A security officer should ensure that the company applies current patches, performs regular backups, and tests its recovery processes. This topic is important because just one instance of a ransomware attack can bring all productivity to a standstill throughout an entire company and may result in huge financial losses.
Insider threats involve the intentional or unintentional misuse of access by employees, contractors, or other trusted individuals. This is considered a major concern because insiders have legitimate entry into the systems that others would have to work harder to penetrate. Access control must be strictly implemented by the security officer, monitoring of users and proper training must be provided so that employees understand how to protect sensitive information. Insider threat prevention avoids malicious behavior and saves an organization from costly human errors.
Social engineering attacks involve tricking people into divulging information, not actually gaining access to a system through technical break-ins, and can take the form of phishing or impersonation. These are dangerous because even very well-protected networks fall victim when an employee is duped and releases information. A security officer should encourage constant training, conduct phishing test simulations, and use robust verification procedures to enable staff to identify and block such attempts. Since people remain one of the weakest points in an organization’s systems, this concern needs committed attention at all times to ensure safety.
-
December 5, 2025 at 2:16 pm #111730
Joseph Doss
ParticipantSeveral of the top 15 include Malware, Phishing and DDoS attacks. Each of which many have herd of but still affect many people and industries. Malware can get on devices through many different ways, downloading the wrong free software, clicking the wrong link or using a USB drive found in the parking lot it is software that is installed on a device used to destroy, steal data or launch other attacks like DDoS. A DDoS or Distributed Denial of Service attack floods networks or servers with traffic in order to crash or prevent others from accessing the service. Phishing targets individuals or groups or individuals by sending scam emails that appear trustworthy or important to trick people into opening a link to install malware or to send sensate Information.
-
-
AuthorPosts
- You must be logged in to reply to this topic.