OCU C)NP C Week 03 Lesson 06 Discussion
- This topic has 6 replies, 4 voices, and was last updated 2 months ago by
Trae Johnson.
-
AuthorPosts
-
-
March 29, 2022 at 11:59 am #66090
Jessica Jagerson
KeymasterProvide at least two major goals and two major threats organizations are facing.
-
April 25, 2025 at 1:30 am #105560
Trae Johnson
ParticipantOrganizations usually pursue some significant goals while at the same time facing severe threats. Two primary goals are network availability and data integrity. Network availability refers to the way a network can remain always on and available without interruption, which is highly crucial for productivity and business continuity. Data integrity is the act of protecting information from unauthorized change or destruction, so that the data remains accurate and reliable from the time it exists. However, organizations are also under attack. One of the key threats is cyberattacks, such as ransomware or phishing, that can compromise sensitive information and disrupt operations. Another major threat is insider threats, where insiders or contractors with authorized access abuse their privileges either knowingly or unknowingly, potentially leading to data breaches or system compromise (Oliviero & Woodward, 2021).
Reference:
Oliviero, J., & Woodward, J. (2021). CompTIA Network+ guide to managing and troubleshooting networks (6th ed.). McGraw-Hill Education. -
April 25, 2025 at 5:21 pm #105580
Erin Kesterson
ParticipantCybersecurity is among one of the major threats in todays businesses to keep thriving in small and medium sized offices. The cyber threats jeopardizes the impact of not only the business but the customers being able to connect to the services. The goal of this is to tackel the breach with real time solutions and to mitigate the risk. Third parties can unlawfully misuse tge oitebtuak if 5G and it is a challenge the risk is emotional or fhysical attacks on the techonogy and allow them to exploit the data colled or stored thy are capitalixwd on the complex of 5 g networks to carry out the malicious activities. The goal would be to increase the rate of malware attackes on existing moble phones and various packages as tousanticovid,apk are hidden in banking apps abd are downloaded from malicious websites or hyperlinks.
-
April 28, 2025 at 6:34 pm #105620
Mjulius513
ParticipantI agree that cybersecurity is very important for small and medium-sized businesses. Hackers can attack through 5G networks and steal important data. They hide viruses in fake apps and bad links, which can hurt both businesses and their customers. We need to find quick ways to stop these attacks and protect mobile phones, data, and networks from abuse.
-
April 29, 2025 at 12:55 am #105633
Trae Johnson
ParticipantYou raise a very sound argument about the greater risk of cybersecurity problems with the growth of 5G networks. I like the way you highlighted the emotional as well as physical risks rather than just technical risks. Having live solutions to breaches is what is called for, and your example of hidden malware in mobile apps is the kind of creativity cyber hackers have developed. Being proactive and alert is surely the direction of the future under such situations.
-
-
April 25, 2025 at 9:35 pm #105584
Mjulius513
ParticipantThe two main goals are growing the business and keeping client information safe. Growing the business means attracting more customers, making more sales, and improving how the business works. Many companies use technology and new ideas. Keeping customer information safe is also important because people trust businesses with their personal details and expect their information to stay private.
However, there are also big problems organizations face. One serious threat is a DDoS attack (Distributed Denial of Service). This is when hackers overload a company’s website or system with too much traffic, causing it to slow down or crash. It can stop people from using the service and hurt the company’s image. Another threat is a rootkit, a type of malware that hides deep inside a computer system. It lets hackers control the system without being noticed. These threats show why strong security is needed in every organization.
-
April 29, 2025 at 12:56 am #105634
Trae Johnson
ParticipantI like the manner in which you connected business growth and acquiring customers’ information, both sit on the same level when building trust. You also broke down threats like DDoS and rootkits really well in plain terms. It certainly points to the reasons businesses cannot do without cybersecurity
-
-
-
AuthorPosts
- You must be logged in to reply to this topic.