Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)NP C Week 03 Lesson 06 Discussion

Viewing 3 reply threads
  • Author
    Posts
    • #66090
      Jessica Jagerson
      Keymaster

      Provide at least two major goals and two major threats organizations are facing.

    • #105560
      Trae Johnson
      Participant

      Organizations usually pursue some significant goals while at the same time facing severe threats. Two primary goals are network availability and data integrity. Network availability refers to the way a network can remain always on and available without interruption, which is highly crucial for productivity and business continuity. Data integrity is the act of protecting information from unauthorized change or destruction, so that the data remains accurate and reliable from the time it exists. However, organizations are also under attack. One of the key threats is cyberattacks, such as ransomware or phishing, that can compromise sensitive information and disrupt operations. Another major threat is insider threats, where insiders or contractors with authorized access abuse their privileges either knowingly or unknowingly, potentially leading to data breaches or system compromise (Oliviero & Woodward, 2021).

      Reference:
      Oliviero, J., & Woodward, J. (2021). CompTIA Network+ guide to managing and troubleshooting networks (6th ed.). McGraw-Hill Education.

    • #105580
      Erin Kesterson
      Participant

      Cybersecurity is among one of the major threats in todays businesses to keep thriving in small and medium sized offices. The cyber threats jeopardizes the impact of not only the business but the customers being able to connect to the services. The goal of this is to tackel the breach with real time solutions and to mitigate the risk. Third parties can unlawfully misuse tge oitebtuak if 5G and it is a challenge the risk is emotional or fhysical attacks on the techonogy and allow them to exploit the data colled or stored thy are capitalixwd on the complex of 5 g networks to carry out the malicious activities. The goal would be to increase the rate of malware attackes on existing moble phones and various packages as tousanticovid,apk are hidden in banking apps abd are downloaded from malicious websites or hyperlinks.

      • #105620
        Mjulius513
        Participant

        I agree that cybersecurity is very important for small and medium-sized businesses. Hackers can attack through 5G networks and steal important data. They hide viruses in fake apps and bad links, which can hurt both businesses and their customers. We need to find quick ways to stop these attacks and protect mobile phones, data, and networks from abuse.

      • #105633
        Trae Johnson
        Participant

        You raise a very sound argument about the greater risk of cybersecurity problems with the growth of 5G networks. I like the way you highlighted the emotional as well as physical risks rather than just technical risks. Having live solutions to breaches is what is called for, and your example of hidden malware in mobile apps is the kind of creativity cyber hackers have developed. Being proactive and alert is surely the direction of the future under such situations.

    • #105584
      Mjulius513
      Participant

      The two main goals are growing the business and keeping client information safe. Growing the business means attracting more customers, making more sales, and improving how the business works. Many companies use technology and new ideas. Keeping customer information safe is also important because people trust businesses with their personal details and expect their information to stay private.

      However, there are also big problems organizations face. One serious threat is a DDoS attack (Distributed Denial of Service). This is when hackers overload a company’s website or system with too much traffic, causing it to slow down or crash. It can stop people from using the service and hurt the company’s image. Another threat is a rootkit, a type of malware that hides deep inside a computer system. It lets hackers control the system without being noticed. These threats show why strong security is needed in every organization.

      • #105634
        Trae Johnson
        Participant

        I like the manner in which you connected business growth and acquiring customers’ information, both sit on the same level when building trust. You also broke down threats like DDoS and rootkits really well in plain terms. It certainly points to the reasons businesses cannot do without cybersecurity

Viewing 3 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.