Mile2 Cybersecurity Certifications

Amy Hastings

Forum Replies Created

Viewing 15 posts - 31 through 45 (of 54 total)
  • Author
    Posts
  • in reply to: OCU C)ISSO C Devotion 01 #106186
    Amy Hastings
    Participant

    I feel the main message from this passage is that God is showing value for someone that may have less, that he also guided John toward good and I also get from this that God seen good in John and so he guided him in the best direction. Almost as if God seen something in John even if he did not seem to have much because his appearance doesn’t make him.

    in reply to: OCU C)ISSO C Discussion Lesson 01 #106185
    Amy Hastings
    Participant

    Risk management is very important for a systems security officer because it helps a lot of different ways such as helping to find threats within the system like the businesses’ information. Risk management is also used as a protection system, as well as a way to find any weaknesses that may be in the system. These reasons and many other is why it is so important for a systems security officer to have within their workspace or business. The risk management is also used to help or to keep any type of threat away before it actually happens, it solves or locates them in time to keep them from causing any damages and this is also called asset protection. Asset protection though is to protect your business or organizations more “physical properties”.

    in reply to: OCU C)SP B Week 05 Devotion #100294
    Amy Hastings
    Participant

    This verse is very empowering because from what it tells me; it tells a lot about today’s world and how we never seem to be satisfied with what we have and what were given. I also believe that we should hunger and thirst for righteousness because we should be wanting to become closer and that we should be looking for righteousness in Gods world.

    in reply to: OCU C)SP B Week 05 Lesson 11 Discussion #100293
    Amy Hastings
    Participant

    I believe there are a bunch of policies needed in order to ensure we have a strong security program. This includes having data protection as any company should have multiple ways to protect their data and their business information. Any company should also have certain people that are authorized in order to keep the data safe and not be accessible to anyone and everyone. You should also keep your passwords updated and changed regularly to ensure extra safety on your companies data.

    in reply to: OCU C)SP B Week 05 Lesson 10 Discussion #100292
    Amy Hastings
    Participant

    There are a lot of different risks and vulnerabilities that companies face today including inside and outside threats as well as Cloud security. The inside threats include people that are capable of stealing important information and sabotaging the company as well. The external threats would include data breaches which means that people can gain access to any of the unauthorized and sensitive data. Cloud security is simply the vulnerabilities that are found in cloud environments. There are also many ways to reduce networks compromise like the strong authentication and access controls, this includes privileged and the multi-factor authentication. The privileged one is where the controls are for that sensitive data in the system. Multi-factor is the company knowing of any types of unauthorized access to the data in their systems.

    in reply to: OCU C)SP B Week 04 Devotion #100196
    Amy Hastings
    Participant

    I believe I sometimes feel like I am at a place where my temptations seem to be insurmountable because some of my temptations feel as if they are close to impossible to reach. But I do know Jesus is there and it makes me believe a lot more that my temptations or goals are reachable through him and his guidance. I can proudly say Jesus has gotten me through so many things I thought would be impossible for me. I also do agree that no matter what we’re going through he will be here for us all and that if I reach high enough to achieve my goals that they will be achieved because of Jesus.

    in reply to: OCU C)SP B Week 04 Lesson 09 Discussion #100195
    Amy Hastings
    Participant

    Hi Latoya, you have a TON of great information here. I also mentioned the symmetric encryption because I believe it is one of the most important ones we could have mentioned here. I like how you mentioned so much detail over the symmetric encryption as well.

    in reply to: OCU C)SP B Week 04 Lesson 09 Discussion #100194
    Amy Hastings
    Participant

    Cryptography is very useful and also very important because it helps protect your data secretly by using special keys. It is also only accessible to people who are given the authorization to access this information. This is good because it ensures the safety of the data in things like emails and others. The various uses would be the symmetric cryptography meaning it is shared by the encryption as well as the decryption and that lets the data move between different platforms safely. Another is the asymmetric cryptography because this one is for the public and the private use but only those authorized can get into the private one while everyone else can only use the public one letting them communicate between each other but in a safe manner.

    in reply to: OCU C)SP B Week 04 Lesson 08 Discussion #100187
    Amy Hastings
    Participant

    You have a great discussion, and I like all the information you have put here, I like how you mentioned the fingerprinting and the other access control types. I believe I learned more than I knew reading this!

    in reply to: OCU C)SP B Week 04 Lesson 08 Discussion #100186
    Amy Hastings
    Participant

    Access controls in a company has a lot of roles and responsibilities but some are the authorization meaning that only certain users can access certain information depending on the permissions they have in the company. All of the access controls are used differently but the main thing it does is it helps to ensure the safety as well as the security of the company. The access control also has a role in the safeguarding sensitive information, and this helps determine who as the access, but it also limits the access depending on their jobs and what they are for.

    in reply to: OCU C)SP B Week 03 Devotion #100078
    Amy Hastings
    Participant

    The passage above tells us about God teaching to the Pharisees and the Sadducees and the “brood of vipers” is an understanding that they are mentioning the harmful actions they took. They were overpowerful but they could not keep relying on each other as Jesus is the true one to rely on with everything. Jesus has faith and love for everyone even if they are labeled as a viper. He pushes us and drives us to live for more.

    in reply to: OCU C)SP B Week 03 Lesson 07 Discussion #100077
    Amy Hastings
    Participant

    Great discussion, I agree with you I also think encryption is a very important network security to use for a business setting. I like how you mentioned the device hardening one as well and you have great information over everything you wrote here.

    in reply to: OCU C)SP B Week 03 Lesson 07 Discussion #100076
    Amy Hastings
    Participant

    A company can implement a lot of different types of network security but I’m going to mention two I think are the most important. Which are firewalls and data encryption, the firewalls are one of the more commonly and known one as it helps keep your information and network from the untrusted networks, like a wall hence the name firewall. Encryption is important to be mentioned because it keeps your information from the other outside and untrusted networks safe for you to use them wen needed.

    in reply to: OCU C)SP B Week 03 Lesson 06 Discussion #100075
    Amy Hastings
    Participant

    Jason, I liked your discussion post, and you have provided great information on some of the storage options. I also like that you included the different RAID options. Your example is a good one as well.

    in reply to: OCU C)SP B Week 03 Lesson 06 Discussion #100074
    Amy Hastings
    Participant

    There are multiple types of data storage methods but the two I want to mention would be cloud storage and primary storage. Cloud storage is used to store your data that is typically kept on a mobile device such as your phone, hence iCloud on iPhone. This allows you to store information such as passwords, emails and more that you’d need more often. Primary storage is used to keep your information stored from a computer and it is much faster. This also keeps your apps stored and updated and lets you access your data faster than some of the others.

Viewing 15 posts - 31 through 45 (of 54 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.