Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Aaron Elliott

Forum Replies Created

Viewing 15 posts - 31 through 45 (of 75 total)
  • Author
    Posts
  • in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90623
    Aaron Elliott
    Participant

    The cloud allows access from almost anywhere with proper credentials, as the service is hosted offsite regardless, allowing ease of access and limitless amount of user access, whereas virtual machines only limited users can access at a time. Virtual machines give users more control over security, whereas the cloud security is reliant on the cloud provider to update and maintain policies.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90621
    Aaron Elliott
    Participant

    From what I learned from previous security classes, open ports are a common entry point for bad actors, proper auditing of the state of the network is needed to ensure the network is allowing the least risk possible.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90453
    Aaron Elliott
    Participant

    A virtualized environment is multiple environments running independently of each other. These environments are sharing the same hardware in the single device. changes made to one environment are contained to that unique environment.

    Cloud environments are a single pool of resources that can be accessed through typically a portal and are tailored to the needs of the time of use. These resources can be used from almost anywhere as long as an internet connection is available.

    A virtual environment costs more to expand, as more hardware is required to effectively add more virtual environments, taking up more physical space on the property as well. Cloud environments can be quickly expanded and add more storage as necessary.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90452
    Aaron Elliott
    Participant

    In order to harden a network and servers, a basic step would to be ensure devices connected to the network be kept up to date with software updates. Microsoft or other operating system manufacturers push security updates regularly, and not keeping up with these will increase the risk of breaches, as old version’s vulnerabilities become better known.

    In house threats are common vulnerabilities for networks. To harden from these threats, one would want to monitor the privileges assigned to employees, making sure one employee does not have more access then required, enacting least privileges. Also training employees on proper device management and the dangers of phishing emails.

    in reply to: OCU C)NP A Week 03 Devotion #90336
    Aaron Elliott
    Participant

    I recently gave up smoking, as I was short of breath all the time and it was consuming all my money. I prayed to God for the strength to give it up and I have been almost a year at this point with no nicotine at all. I feel much better and thanks to the Lord I have the strength to never go back.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #90270
    Aaron Elliott
    Participant

    I have not worked in an IT environment, but I have witnessed the carnage phishing emails can do to family members. My family member had all their devices connected to their network infected and all personal information stolen and used for fraudulent purchases. This attack on a corporate network would be a serious issue.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #90269
    Aaron Elliott
    Participant

    I remember the days when using Bluetooth enabled devices you could hear the transmission coming to cellphones through speakers with a sort of beeping rhythm. A problem I deal with today is the microwave is a short distance from my desktop, so in use my headphones cut in and out due to the frequency interference.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #89952
    Aaron Elliott
    Participant

    Two major goals of organizations today would be to reduce risk as much as possible. There will always be security risks, but time and money play a role in how secure a company can make their data. The second goal is assisting productivity with new and innovative technologies. The goal is to implement new devices or software without compromising security by doing so.

    Organization face threats from many fronts, the most common being human error, and malicious attacks. Human error come into play when associates accidently let malware into the network from phishing emails or other malicious attacks. Also, human error can be attributed to access creep, where an individual has elevated privileges as an oversight to remove the non-needed access. Malicious attacks can be in the form of DDOS attacks or holding company data hostage for ransom from the victim company.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #89951
    Aaron Elliott
    Participant

    The first wireless LAN standard was developed by the Institute of Electrical and Electronics Engineers, and the rest of the family of standards are also maintained by the Institute. The first standard was only known as 802.11 and published in 1997. This first version allowed speeds up to 2Mbps. Being the first version, devices were not designed to a single standard and did not communicate with each other well.

    Speeds really took off after standard 802.11g and later versions. Version 802.11G allowed fifty-four megabytes per second over a 20.4 gigahertz band. This version improved security over earlier models and was backwards compatible with the earlier models as well.

    in reply to: OCU C)NP A Week 02 Devotion #89927
    Aaron Elliott
    Participant

    I have come to the realization that many media outlets have one thing in common, and that is the pursuit of money, through one means or another. I take many opinions with a grain of salt but rely on my own beliefs and feelings. These beliefs come from the morality of the Bible and what I beleive to be the best for my wellbeing and those around me, based on the Bibles teachings.

    in reply to: OCU C)NP A Week 02 Lesson 04 Discussion #89902
    Aaron Elliott
    Participant

    Switches sounds like the ideal hardware for pushing updates over a LAN like school or work settings when one needs to update many systems at once. All the settings a router offers, plus the added security is an important tool for network management.

    in reply to: OCU C)NP A Week 02 Lesson 03 Discussion #89901
    Aaron Elliott
    Participant

    With the boom of online shopping, thanks to HTTPS shoppers can easily see which website is more reliable and less likely to have their information stolen. SSH sounds like an important tool for any server administrator.

    in reply to: OCU C)NP A Week 02 Lesson 04 Discussion #89897
    Aaron Elliott
    Participant

    Switching is a process classified as layer two of the OSI model. Switching sends data to its destination at a faster rate than routing. Switches use MAC addresses to deliver data, but switches also listen to network traffic to determine the fastest route to send data, but if no route can be found, the port will become blocked and listen only. Switches are typically only used for local destinations for a single network. Switches also broadcast data, sending the data to all available ports.

    Routing is a layer higher at level 3. Routing uses IP address to determine the destination of data, and such can be done between multiple networks. Routers have protocols that determine multiple destinations for packets.

    in reply to: OCU C)NP A Week 02 Lesson 03 Discussion #89881
    Aaron Elliott
    Participant

    Internet Control Message Protocol (ICMP) is a protocol that occurs on the fly during data transit. This protocol has features to ping the destination, notify of unreachable hosts, as well as handling congestion with too much data transmitting. The protocol can slow data traffic down so data can be delivered or find new routes to deliver data. Packets time to live notifications are also given for undelivered data.

    Transmission Control Protocol (TCP) is a protocol that is connection based. The protocol ensures delivery, and the receiver are correct through a series of handshakes. TCP is referred to as a more reliable protocol as data is monitored during transmission to make sure the data being delivered correct.

    User Datagram Protocol (UDP) Considered an unreliable communication protocol based on the fact there is no check to see if the data was received. This protocol is meant for faster data transmission like streaming or other heavy data loads.

    in reply to: OCU C)NP A Week 01 Devotion #89787
    Aaron Elliott
    Participant

    Jesus Christ is my savior who has forgiven me for my sins. I wish to further my understanding of the Bible and of Jesus’s teachings, so to have a stronger connection to my faith and to use my faith as a foundation for my life to base my morals and path through life.

Viewing 15 posts - 31 through 45 (of 75 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .