Addison West
Forum Replies Created
-
AuthorPosts
-
Addison West
ParticipantThat’s a great explanation of how companies can protect their networks and information. I really like how you covered all the main areas of security, including administrative, technical, and physical controls. You did a nice job explaining that it’s not just about having strong technology, but also about setting clear rules and training employees to handle data safely. Mentioning tools like firewalls, antivirus software, and intrusion detection systems shows that you understand how technology helps defend against hackers. I also liked how you pointed out the importance of physical security, because many people forget that protecting access to equipment is just as important as protecting the data itself. Your mention of encryption, multi-factor authentication, and regular updates shows a strong understanding of how to keep systems secure over time. Overall, your response gives a complete and thoughtful picture of what it takes to keep a company’s network safe.
Addison West
ParticipantHey Misty,
That was a really clear and well-organized explanation. I like how you described each type of data storage and explained what makes them different. You did a great job showing how primary storage like RAM is fast and used for temporary data, while secondary storage such as hard drives and solid-state drives is used to keep files and programs even when the computer is turned off. I also liked that you included tertiary or archival storage, like magnetic tapes and CDs, since many people forget those are still important for backups and long-term storage. Mentioning cloud storage was also a nice touch because it shows how modern technology has made it easier for people to save and access their data from anywhere. I think your point about how the best storage option depends on speed, cost, and how quickly the data is needed really ties everything together well.Addison West
ParticipantThat is an excellent explanation of the different types of security controls. You did a great job clearly describing each category and showing how they all work together to protect an organization. I like how you pointed out that administrative controls focus on people and policies, technical controls rely on technology, and physical controls deal with securing the actual equipment and buildings. Your mention of defense in depth was also a strong point because it highlights how combining these layers creates a much stronger and more complete security system. Overall, your response shows a deep understanding of how organizations can protect their data and systems from many different types of threats.
Addison West
ParticipantThat is a really clear and well-organized explanation of the different types of data storage. You did a great job breaking down each option and explaining what it is used for. I especially like how you pointed out that each type has a balance of cost, speed, and capacity because that shows you understand why people and businesses use a mix of storage options. Your mention of cloud storage and network-attached storage was also a good touch since those are becoming so important for collaboration and remote work. Overall, your explanation shows a solid understanding of how data is stored and managed in today’s digital world.
Addison West
ParticipantThere are different types of controls a company can use to keep its network safe and protect its information. These controls are called physical controls, technical controls, and administrative controls. Each type helps protect the company in a different way. Physical controls are things that protect the equipment, like computers and servers. Examples include locked doors, cameras, ID badges, and alarms. These help stop people who are not allowed from getting near important devices or data. Technical controls are tools and programs that protect the network digitally. Firewalls, antivirus software, encryption, and strong passwords are common examples. Firewalls block bad traffic from entering the network, antivirus software removes harmful viruses, and encryption keeps information private by turning it into a secret code that only approved users can read. Companies can also use multi-factor authentication, which means people must verify their identity in more than one way before logging in. Administrative controls are rules and policies that teach employees how to keep the network safe. These include training sessions, password policies, and steps to follow when handling customer information. Employees are often the first line of defense, so teaching them to recognize threats like phishing emails is very important. When all three types of controls, physical, technical, and administrative, are used together, they create a strong defense system. This combination helps protect a company’s data, devices, and people from hackers, viruses, and other cyber risks.
Addison West
ParticipantThere are many types of data storage options that people and businesses use to save and protect their information. The main types are primary storage, secondary storage, and cloud storage, and each one is used for different purposes depending on how much data is being stored and how often it needs to be accessed. Primary storage, also called internal or main storage, includes the computer’s memory, such as RAM (Random Access Memory). It is used to store data that the computer is currently working on, and it is very fast but temporary since the information is lost when the computer is turned off. Secondary storage is used for keeping data for a longer time and includes hard drives (HDDs) and solid-state drives (SSDs). Hard drives can store large amounts of data and are often found in desktop computers and laptops, while SSDs are faster and more reliable because they have no moving parts. People use secondary storage to save files, photos, music, and software. Another popular type of data storage is cloud storage, which saves data online through services like Google Drive, iCloud, or Dropbox. Cloud storage allows users to access their files from anywhere with an internet connection, making it great for sharing files and keeping backups safe if something happens to a physical device. Overall, all of these storage types work together to help people manage and protect their data, primary storage is for quick use, secondary storage is for long-term keeping, and cloud storage allows easy access and sharing across devices.
Addison West
ParticipantHi Trae,
I really like how you explained the cybersecurity challenges organizations faced in 2020. You captured how the sudden shift to remote work exposed weaknesses that many companies didn’t even realize they had. I remember hearing about the rise in phishing scams and ransomware during that time, and it makes sense that fear and confusion made people more vulnerable. I think it’s great that you mentioned how businesses responded by improving identity management and adding multi factor authentication, since those steps really do make a big difference in protecting accounts.Addison West
ParticipantHi Misty,
I really like how you explained the OWASP principle about Identification and Authentication Failures. You did a great job showing why strong authentication and good session management are so important for keeping systems safe. I agree that weak passwords and poor login controls can make it easy for attackers to break in, which is why using multi factor authentication is such a smart idea. It is great that you also mentioned account lockouts after several failed attempts because that is a simple but powerful way to stop password guessing.Addison West
ParticipantI truly believe the prophecies about Jesus are real and powerful. Reading Matthew 2 and seeing how the prophecy in Micah was fulfilled makes my faith even stronger. It amazes me that God chose such a small, humble place like Bethlehem for the birth of the Messiah, just as the prophet said. The fact that these words were written hundreds of years before Jesus was born and then came true exactly as promised shows me that God’s Word is trustworthy and true.
When I think about the Dead Sea Scrolls and how they prove that these prophecies existed long before Christ’s birth, it gives me confidence that the Bible isn’t just a story, it’s history and truth. I am persuaded because there’s no way all of those details could line up by chance. I believe that God was showing His power and plan from the very beginning.
God is definitely speaking through His Word, and I want to listen. I pray to have an open heart and strong faith to follow what He says. These fulfilled prophecies remind me that God always keeps His promises, and that Jesus truly is the Messiah sent to save us.
Addison West
ParticipantHi there,
I really like how you explained the idea of “Separation of Duties.” You made it easy to understand and showed why it’s such an important security principle. I agree that splitting tasks between different people helps prevent mistakes and keeps everything more honest. Your example about payments was a great way to show how this works in real life, it makes sense that no one person should be able to approve and send money on their own. I also like how you pointed out that this principle builds accountability. When people share responsibilities and double-check each other’s work, it creates a safer and more trustworthy system. You did a great job showing how this simple idea can make a big difference in keeping data and systems secure.Addison West
ParticipantHey Teisha,
I really like how you explained the challenges of 2020 and how your workplace handled them. You showed how hard it was for companies to switch to remote work so quickly. I agree that home networks and personal devices became big risks, especially with all the fake emails and COVID-related scams going around. It’s great that your company used ethical hackers to test your systems and trained employees to avoid mistakes. That shows how important people are in keeping systems safe. It also sounds impressive that your IT team set up mobile workstations and VPNs so fast to keep everyone working safely from home. You made a good point that even VPNs can be risky if they aren’t set up the right way. I also like how you said that cybersecurity isn’t just a tech problem but a business one too. Building systems that can keep running even when something goes wrong is really important. Overall, your response shows how teamwork, quick thinking, and good planning helped your company stay secure during a tough time.
Addison West
ParticipantIn 2020, many new security problems appeared as more people began working from home during the COVID-19 pandemic. One big issue was ransomware, where hackers locked up company data and demanded money to unlock it. Phishing was also a big problem, hackers sent fake emails to trick people into giving away passwords or clicking harmful links. Another concern was cloud security, since many companies quickly switched to online systems and didn’t always set them up safely. The SolarWinds attack showed how hackers could break in through software used by many organizations, proving that even trusted vendors could be risky.
To deal with these problems, companies started spending more money on cybersecurity and hired more experts to protect their systems. They began using multi-factor authentication and Zero Trust models, which require people to prove who they are every time they log in. Many also added better tools to find and stop attacks faster and trained employees on how to spot fake emails. Companies improved their patching systems to fix weaknesses quickly and followed new rules about data privacy and breach reporting. Overall, 2020 pushed businesses to take security more seriously and build stronger protections against future cyberattacks.
Addison West
ParticipantOne of the top 10 OWASP security principles is called “Fail Securely.” This means that when a system or website has an error or something goes wrong, it should still stay safe and protect important information. Even if something breaks, the system should not let hackers in or show private details about how it works. This is very important because many security problems happen when errors give away too much information. For example, if a website shows a long error message to a user, it might tell them details about the server or database that a hacker could use to attack the system. Instead, websites should show a simple message like “Something went wrong” and keep the real error details hidden for the system administrator to see later. Failing securely also means that if a system crashes, it should deny access instead of letting anyone in by mistake. This helps protect sensitive information and keeps people’s data safe. Overall, “Fail Securely” is a very important OWASP rule because no system is perfect, mistakes and errors will always happen. What matters is that the system is designed to handle those errors safely so that hackers cannot use them to cause bigger problems.
Addison West
ParticipantReading Matthew Chapter 1 really made me think about who Jesus is and what He means to me. I believe Jesus is the Son of God, born through the Holy Spirit just like Matthew described. He wasn’t just a good man, He was perfect, sinless, and sent by God to save us. Knowing that He didn’t inherit sin like the rest of us makes me realize how special His birth truly was. Jesus came to take the punishment that I deserve, and that shows how much God loves us.
To me, Jesus means forgiveness, peace, and hope. Because of Him, I don’t have to carry the weight of my sins or fear death. He gave His life so that I could have eternal life. When I think about what I will do with Jesus, I know I want to follow Him and grow in my faith every day.
Since accepting Jesus as my Savior, I try to live in a way that honors Him, reading His Word, praying, and using my gifts to help others. I know I still have a lot to learn, but I want to keep growing closer to Him. Jesus has truly changed my life forever.
Addison West
ParticipantYou did a great job explaining the different risks that come with using mobile devices. I like how you mentioned malware and phishing since those are two of the biggest threats most people face every day. Your point about public Wi-Fi was also really good, many people don’t realize how easy it is for hackers to steal data on open networks. I also liked that you included outdated software and lost or stolen devices, since those are simple but serious risks that are often ignored. The tips you gave for protecting devices, like using strong passwords, turning on multifactor authentication, and keeping software updated, were very practical and easy to follow. Overall, your post does a great job showing how mobile users can stay safe and protect their personal information in today’s digital world.
-
AuthorPosts