OCU C)OST C Discussion Lesson 08
- This topic has 18 replies, 9 voices, and was last updated 4 days, 7 hours ago by
James Settle.
-
AuthorPosts
-
-
April 1, 2022 at 3:34 pm #66409
Jessica Jagerson
KeymasterSuggest at least three different ways networks are vulnerable as well as three different methods or controls that would help curve and protect your network infrastructure.
-
April 29, 2025 at 12:44 am #105632
Isabelle Tubbs
ParticipantNetworks connect a user and their device, which contain a lot of sensitive data about the user and organization. As a result, vulnerabilities like insecure technologies and user behavior, as well as attack threats like malware, should be prevented.
Malware can come in many different forms, but it is essentially a way to spread malicious software throughout a system, which could spread to other systems as well. One way to prevent the installation of malware is to have antimalware installed so that it can detect suspicious files before installation and notify the user.
Insecure technologies could occur from older equipment and protocols. For example, using an older version of Windows could make it susceptible to forced access attacks from a rainbow table. If a more modern version of Windows was installed, it would make it more difficult for attacks to be successful. Also, updating the hardware on a device would make it stronger as well.
The behavior of users can leave a device vulnerable if they are not educated in preventing attacks and using safe techniques while online. Teaching users how to use their devices safely would prevent threats from users such as installing malware. Additionally, restricting user controls would prevent some users from being able to install malware in the first place.
-
April 30, 2025 at 5:43 pm #105648
Carlos Martes
ParticipantHello Isabelle! Great input in regards to teaching users how to user their devices safely. I do believe that may individuals are introduced to devices at an early age and are not properly educated when it comes to accidentally installing malware. Currently, there are variety of apps and anti virus systems that can monitor and prevent such case. Without proper antivirus or endpoint detection tools, infected machines can go unnoticed while malware spreads or exfiltrates data.
-
May 5, 2025 at 11:18 pm #105750
James Settle
ParticipantGreat post as usual Isabella. Excellent point regarding how essential antimalware software is on a systems to prevent spread of malicious software. I would go even further to say equally as important as it is to have antimalware software, it is just as important to stay up-to-date on downloading and installing current definitions. This will help to prevent intrusions on the individual systems and better yet stop the spread of viruses and malware to the network at large.
-
-
April 29, 2025 at 2:59 pm #105638
Kanthony
ParticipantWelcome to Week 4. This week, you will complete Chapters 8 and 9. Please remember that in addition to readings and videos, you will need to complete the devotion and the discussions and reply to at least two other people. Always email me if you have any questions.
Below is a devotion from Billy Graham’s Devotions. I love these and find that they relate to my life in some way. ~Dr. Anthony
Dear brothers, I have been talking to you as though you were still just babies in the Christian life . . .
—1 Corinthians 3:1 (TLB)
Some people have received Christ but have never reached spiritual maturity. They have been in church all their lives, and yet they have never become mature Christians. They are still considered “spiritual children” and “babes in Christ.” They know little Scripture. They have little desire to pray, and bear few of the marks of a Christian in their daily living. To say, “I will resolve to do better, I will muster all my will power and revise my way of living,” is noble, but futile. A corpse could as well say, “I will-through sheer effort-rise out of this coffin and be a living man again.” You need a power outside yourself. You cannot get over the habits and chains that are binding you. You need outside help. You need Christ.The Bible tells of a bridge of faith which reaches from the valley of despair to the high hills of glorious hope in Christ. It tells where we are, but beyond that-it tells where we may be in Christ. Now, of course, you will not be completely mature until you are in the presence of Christ, but you should be growing every day as a Christian.
-
April 29, 2025 at 4:59 pm #105642
Carlos Martes
ParticipantUnauthorized Access is a common issue as hackers can exploit weak passwords, outdated authentication methods and or unpatched systems to gain access to the network. Malware and Ransomware attacks are malicious software that can spread across a network, encrypting files, stealing data or causing disruptions. Last is a Man-in-the-Middle (MitM) in which an attacker can secretly intercept or alter communications between two parties without them knowing, often stealing sensitive information.
Three methods to Protect the Network Infrastructure:
1. Implement strong authentication and Access Controls- using multifactor authentication which we are all familiar with, to enforce strong password policies.
2. Regular Update and Patch systems- Keeping all software, operating systems and firmware updated to fix security vulnerabilities before attackers can exploit.
3. Using Encryption and Secure communication protocols- Encrypt sensitive data and use secure protocols like HHTPS, VPNs, and SSL/TLS to prevent interception.-
April 29, 2025 at 11:34 pm #105644
Isabelle Tubbs
ParticipantHello, Carlos! Yes, if a hacker or a malicious software gains any type of access to a system, this is a huge threat. However, like you mentioned, keeping things up to date and implementing strong policies and protocols can reduce the level of risk. I also would like to add that educating users on safe online practices could prevent unintentional installation of malware.
-
-
May 2, 2025 at 9:55 pm #105662
James Settle
ParticipantThree ways networks become vulnerable can be due to outdated software, using the hardware outside of the preferred network, and compromised usernames and passwords (Pioth & Pioth, n.d.). Outdated malware or antivirus software doesn’t have updated security protocols and can be vulnerable as a result. In many cases employees use their company issued machines outside of the office & inside of internet cafes, coffee shops, etc on wireless networks that are less than secure which leave them wide open to cyberattacks. Lastly compromised usernames and passwords are a result of people writing them down and leaving them in insecure areas, or creating weak, easily decipherable passwords.
As a result of these vulnerabilities, three ways to protect your network infrastructure would be to;
1.) keep software, malware & antivirus definitions up to date.
2.) utilize encryption and strong secure network connections, as well as VPN, or virtual private network connections when outside of the office on company devices.
3.) Implement stronger access control features and MFA, or multifactor authentication when accessing the network.References
Pioth, J., & Pioth, J. (n.d.). 3 Types of network vulnerabilities and how you can avoid them. https://www.coeosolutions.com/news/network-vulnerabilities
-
May 3, 2025 at 10:33 am #105679
Isabelle Tubbs
ParticipantGreat evaluation of network vulnerabilities and possible solutions or controls. What I found particularly interesting was that you brought up using a different network, specifically using them on insecure public network connections. This shows the importance of educating users about their technology and network connections. Public networks may seem more convenient, but they are not the safest. Like you mentioned, encryption and VPN connections are good actions to take.
-
-
May 3, 2025 at 8:03 pm #105681
Cameron Tackett
ParticipantThe first thing that comes to mind in vulnerability is user error. It is always astounding me how many people it is okay to click or open anything they see. I have heard so many stories of people having ransomware or spyware put on their PC’s or even mobile devices because of spam emails or text messages. The easiest way to curve these issues would in my opinion be to educate those who are less tech savvy. For example, my grandmother is a great person to compare this to. As she actually fell victim to a malware infection of her laptop because she was clicking on random links in her email. Now at the time she was very new to everything and wanted a Facebook account. So being able to tell her not to click on things that she does not know or knows very little about was a great solution.
Another example I can think of is. Using public Wi-Fi. For example, the free public Wi-Fi at McDonalds or any other place is a horrible place to be. Unless you take the proper precautions. Use a VPN being one possible type. Or just DO NOT use public Wi-Fi for anything.
The third thing that comes to mind is not updating your security/OS in general. Attackers are always coming up with new ways to infect a system/server. So staying on top of any sort of update is paramount to some of the best preventative measures you could take.
-
May 4, 2025 at 6:01 pm #105688
Caleb Kiser
ParticipantHi Cameron,
I totally agree—user error is a huge vulnerability. It’s wild how quick people are to click on random links or download shady attachments. A friend of mine clicked on an email, and a hacker literally took over his computer. Education is key. Staying cautious with public Wi-Fi and being aware of phishing tactics can really go a long way.
-
-
May 3, 2025 at 11:14 pm #105684
Caleb Kiser
ParticipantNetworks are vulnerable in more ways than people often realize, and a lot of it comes down to small oversights that open the door for bigger issues. One major vulnerability is unpatched or outdated software—those ignored updates can leave systems exposed to known exploits. Another common issue is weak or reused passwords, which make it incredibly easy for attackers to gain unauthorized access. Then there’s the risk of insider threats, whether intentional or accidental, where someone with access compromises the network from within.
To protect your network infrastructure, it’s important to take a layered approach. First, keep all systems updated** with regular patching to close security gaps. Second, segment your network—separating different areas limits how far an attack can spread if one part is compromised. Lastly, implement strong access controls, including multi-factor authentication and permission reviews, to make sure only the right people can access sensitive systems. It’s not just about defense—it’s about being prepared.
-
May 5, 2025 at 9:48 pm #105746
Cameron Tackett
ParticipantCaleb,
I like the way you summarized in the first paragraph “small oversights”. That is paramount in my opinion to network safety. There are so many steps to take to ensure you are doing everything you can, and even then someone may still “crack the network”. So taking every precaution we can to ensure we are using every tool at our disposal is so important.
I also really liked your ending statement. All we can do is be prepared. However, I also believe that remembering your first plan will eventually fail. So what do we do when something does go wrong? Is just as important.
-
-
May 4, 2025 at 9:17 pm #105690
Misty Stewart
ParticipantNetwork vulnerabilities can be divided into hardware, software, firmware, and human vulnerabilities. If any of these areas are not managed well, your network can become vulnerable. Outdated software is a big risk because it might not have the latest security measures to stop cyberattacks. It’s important to regularly check for updates to keep your network secure. Some updates can happen automatically, but others need to be done manually. The person in charge of your network should handle these manual updates.
Weak passwords are another common problem. Many employees create easy-to-remember passwords without knowing the security risks. Using weak or reused passwords can lead to security breaches, allowing hackers to access work accounts and steal sensitive information. Having a strong password policy is crucial to protect against cyber-attacks.
Regular updates are key to keeping your network safe. They fix vulnerabilities, improve performance, and ensure compliance with regulations. These updates help protect against cyber threats and keep your network running smoothly.-
May 4, 2025 at 9:29 pm #105693
Teisha Nolen
ParticipantHi Misty!
Great summary of some of the vulnerabilities facing our networks today. You highlighted some very common and practical ways to tighten up network security. User behavior is such a big wildcard. I love that you mentioned passwords. I know people have passwords to everything in today’s world. I have found myself exhausted trying to remember them all. The temptation to make them something easy is understandable. Companies like Bitwarden can be helpful in keeping our passwords secure.-
May 5, 2025 at 9:51 pm #105747
Cameron Tackett
ParticipantMisty,
Along with Teisha, I also thought about passwords being a key point. It seems so simple, and yet I think that is where we go wrong. It makes it so much easier to just make everything the same password. I recently did an audit on every single password saved to my computer, and discovered that I had over 150 different accounts. Almost 50% of them used the same password, and who knows which of them have been accessed without my knowledge due to that. So always being cautions and finding ways to keep track of them is key. Great talking point on that subject.
God bless!
-
-
-
May 4, 2025 at 9:21 pm #105691
Teisha Nolen
ParticipantNetwork vulnerabilities can take many forms. Some common vulnerabilities include insecure technologies, weak configurations, and user behavior. Using secure technology is detrimental to network integrity, while insecure technology can allow cybercriminals to access a network. Ensuring that software is trusted, correctly configured, and routinely updated are steps that can be taken to lessen this risk. Weak network configurations are another way that criminals gain access to important information. Using protocols that are not secure or sending data that is not encrypted opens your organization up to having sensitive data intercepted. Using the most secure technologies and strong network configurations goes a long way in keeping your network safe, but the vulnerability of user behavior will almost always be an issue. User behavior, such as writing down passwords, leaving a workstation unlocked and unattended, or falling for one of the many tricks perfected by cybercriminals, can put your network in danger as well.
Putting security protocols in place, such as multifactor authentication, utilizing strong user privileges, and data encryption, will go a long way in protecting our network and the sensitive data in our organizations.-
May 4, 2025 at 11:22 pm #105695
James Settle
ParticipantExcellent post Teisha. I pointed out poor user behavior as an issue as well. Leaving passwords out in the open, or written down on a post it, taped to the monitor, leaving a workstation unlocked on breaks and lunches. All user behaviors that increase the likelihood of vulnerability to cyberattacks. Companies have attempted to curb such behavior by adding features to change passwords every 90 days & not being able to add incremental numbers to the end of existing passwords. Even though things have become more frustrating for employees, any and all efforts to create stronger more complex combinations of alphanumeric passwords with requirements to have at least one number, one capital letter, and one symbol as well as minimum password length requirements are all considered best practices.
-
May 5, 2025 at 7:47 pm #105743
Misty Stewart
ParticipantHi Teisha,
Your post talks about the main points of network weaknesses and why strong security is important. Network weaknesses can be caused by unsafe technology, poor setups, and how people behave. Using safe technology is key to stopping cybercriminals from getting into a network.
Poor network setups can reveal sensitive information through unsafe methods or unprotected data. Using safe technology and strong setups is crucial to protect your network.
How people behave is a big weakness. Things like writing down passwords, leaving computers unlocked, or falling for tricks from cybercriminals can harm security. Using security measures like multifactor authentication, strong user permissions, and data encryption will improve network protection and keep sensitive information safe.
-
-
-
AuthorPosts
- You must be logged in to reply to this topic.