Amy Hastings
Forum Replies Created
-
AuthorPosts
-
Amy Hastings
ParticipantThis devotional to me says that those who claim to be religious or claim to love God must show it in everything in their everyday lives and not just in a church setting. This devotional to me also says that Jesus wants to help the ones who can admit they have sinned and not the ones who are already righteous. Meaning his main goal is to help those who need it, and just because you are sitting with the people who may have sinned dose not also make you a sinner. This devotional is very touching but can be hard to understand fully, I cannot say I fully understand the meaning behind it but to me this is what it is saying.
Amy Hastings
ParticipantSymmetric Cryptography is a key cryptography meaning that it only uses one key that it used by the sender as well as the receiver. The sender and receiver use this key to communicate secretly so just they know what the message is. This also does help keep their conversation private.
A con of symmetric cryptography is that if the key is not safely transmitted then it can lead to a vulnerability towards the users. The key has to be transmitted safely so it cannot get interrupted while its being transmitted. Another con is that if the key somehow gets compromised this will also cause your data to become at risk.
A pro of symmetric cryptography is that it is a lot faster using one key and it requires less work than that of the asymmetric cryptography. The symmetric cryptography is also less expensive than the asymmetric cryptography.Asymmetric Cryptography is where the company uses two keys, and they are a public and a private key. The use of each is pretty simple, the public key is usually shared between people while the private key is kept secret between other people. One is also used for encryption while the other is used for decryption.
Pros of asymmetric cryptography is that it has a lot more security than symmetric cryptography does because with this one you do not have to exchange keys back and forth. It also uses things like online signatures that the sender has to sign so that way the receiver can use the private key to verify it, so it is more protected.
Cons of asymmetric cryptography is that it is slower than the symmetric cryptography is and this causes it to not be able to hold a large amount of data encryption. Another is that if you have the private key then anyone that has access to it can unfortunately disrupt your data.Amy Hastings
ParticipantA Symmetric Cipher is simply a private way to share information among your friends or another person like a key or code. It’s like if you and one other person were to want to speak to one another privately without anyone else knowing what you’re writing. This is kind of like when you were in school and came up with a “made-up” language by using other things than letters to create a message. This helps you and whoever you’re writing to keep your letter confidential.
A common Symmetric Cipher is DES or Data Encryption Standard. This is used to also use a secret key or code to send messages to another person. This key or code can only be used by you unless you let someone else have access or tell them what your code is. The only one that would be able to know what you wrote would be the one who has that key. So simply a Symmetric Cipher is a way to send messages confidentially with a secret made up code or language made by you.Amy Hastings
ParticipantOur company is searching for a responsible and reliable Operations Security Manager to come and join our company’s team. By applying for this position, you will be responsible for ensuring the protection of our data and personal information.
The basic responsibilities in taking this position are monitoring, to ensure the security in the organization and be able to identify threats as well as responding to security incidents. You will also be required to manage records within the system and change the control process, review and approve of changes.
You will also have to meet the requirements of patch management as well as access rights, this does include the whole patch management system program, you must be able to monitor and report effectiveness. Lastly, you will be responsible for overseeing the access control systems and to keep the appropriate permissions for the employees as well as the system.
If this sounds like something you’d be interested in, and you meet the matching requirements we would love to have you on our security management position in our team!
Amy Hastings
ParticipantThe two frameworks I choose were VRIO and TOWS, VRIO is an analysis that is able to gain access to a company’s resources and other information such as their value as well as their rarity. VRIO is also commonly used to help the company using it to find any advantages within the company and this has a big impact on helping their company plan. The value as mentioned above, is what helps the company to have better performance. Also, since VRIO is considered a rarity, it is harder for unauthorized people or users to gain access to the company’s information.
TOWS is an analysis that helps to build onto the SWOT framework or analysis, it helps build onto SWOT because it builds off of the relationships that an organization or a company has with its strengths and weaknesses. This helps a company to find some better solutions or options to better help the company using it. TOWS is an important framework or analysis to have inside a company because it also takes SWOT’s findings and put it to use.Amy Hastings
ParticipantThe access control characteristics and threats to the access control system are identification, authentication, and authorization. Identification is used to identify things within the system such as the user or the device being used while authentication is the use of passwords and usernames in order to keep the user’s information secure. Authorization is the process of finding the best action to take depending on the problem or depending on what the user is allowed to have access to. Some weaknesses of the access control characteristics would be inside threats including things such as someone gaining access to information outside of the user’s control. Broken access controls would be another threat for this because it can leave your system vulnerable to more threats.
Amy Hastings
ParticipantIdentity management, authentication techniques, single sign-on, and access control monitoring all ways to protect your data from those who do not have the correct levels of access or from unauthorized people. The Authentication techniques are passwords or is a multi-factor authentication such as passwords or fingerprint passwords, lots of different ways. The single sign-on is a way to let the users only log into the app or site one time and they can do multiple things without having to keep re-entering the password. Lastly, the access control monitoring is the way that they use to track or helps to identify different risks throughout.
Amy Hastings
ParticipantInformation security management is crucial for a company’s success because it protects the integrity and safeguards important information. From what I have read, data leakage can have a huge negative impact on a company, it is important to keep this from happening in order to keep the company from getting violations. Maintenace should always be used and considered in any company. Maintenance in this means to keep processes and protecting confidential information, this also helps keep up with software updates and many other things. Goals in information security management is to keep the company’s information safe, and this is done by implementing the access controls as well as encryption. The RAID systems also require backups and having more than one solution to it.
Amy Hastings
ParticipantI feel the main message from this passage is that God is showing value for someone that may have less, that he also guided John toward good and I also get from this that God seen good in John and so he guided him in the best direction. Almost as if God seen something in John even if he did not seem to have much because his appearance doesn’t make him.
Amy Hastings
ParticipantRisk management is very important for a systems security officer because it helps a lot of different ways such as helping to find threats within the system like the businesses’ information. Risk management is also used as a protection system, as well as a way to find any weaknesses that may be in the system. These reasons and many other is why it is so important for a systems security officer to have within their workspace or business. The risk management is also used to help or to keep any type of threat away before it actually happens, it solves or locates them in time to keep them from causing any damages and this is also called asset protection. Asset protection though is to protect your business or organizations more “physical properties”.
Amy Hastings
ParticipantThis verse is very empowering because from what it tells me; it tells a lot about today’s world and how we never seem to be satisfied with what we have and what were given. I also believe that we should hunger and thirst for righteousness because we should be wanting to become closer and that we should be looking for righteousness in Gods world.
Amy Hastings
ParticipantI believe there are a bunch of policies needed in order to ensure we have a strong security program. This includes having data protection as any company should have multiple ways to protect their data and their business information. Any company should also have certain people that are authorized in order to keep the data safe and not be accessible to anyone and everyone. You should also keep your passwords updated and changed regularly to ensure extra safety on your companies data.
Amy Hastings
ParticipantThere are a lot of different risks and vulnerabilities that companies face today including inside and outside threats as well as Cloud security. The inside threats include people that are capable of stealing important information and sabotaging the company as well. The external threats would include data breaches which means that people can gain access to any of the unauthorized and sensitive data. Cloud security is simply the vulnerabilities that are found in cloud environments. There are also many ways to reduce networks compromise like the strong authentication and access controls, this includes privileged and the multi-factor authentication. The privileged one is where the controls are for that sensitive data in the system. Multi-factor is the company knowing of any types of unauthorized access to the data in their systems.
Amy Hastings
ParticipantI believe I sometimes feel like I am at a place where my temptations seem to be insurmountable because some of my temptations feel as if they are close to impossible to reach. But I do know Jesus is there and it makes me believe a lot more that my temptations or goals are reachable through him and his guidance. I can proudly say Jesus has gotten me through so many things I thought would be impossible for me. I also do agree that no matter what we’re going through he will be here for us all and that if I reach high enough to achieve my goals that they will be achieved because of Jesus.
Amy Hastings
ParticipantHi Latoya, you have a TON of great information here. I also mentioned the symmetric encryption because I believe it is one of the most important ones we could have mentioned here. I like how you mentioned so much detail over the symmetric encryption as well.
-
AuthorPosts