Amy Hastings
Forum Replies Created
-
AuthorPosts
-
Amy Hastings
ParticipantI feel the main message from this passage is that God is showing value for someone that may have less, that he also guided John toward good and I also get from this that God seen good in John and so he guided him in the best direction. Almost as if God seen something in John even if he did not seem to have much because his appearance doesn’t make him.
Amy Hastings
ParticipantRisk management is very important for a systems security officer because it helps a lot of different ways such as helping to find threats within the system like the businesses’ information. Risk management is also used as a protection system, as well as a way to find any weaknesses that may be in the system. These reasons and many other is why it is so important for a systems security officer to have within their workspace or business. The risk management is also used to help or to keep any type of threat away before it actually happens, it solves or locates them in time to keep them from causing any damages and this is also called asset protection. Asset protection though is to protect your business or organizations more “physical properties”.
Amy Hastings
ParticipantThis verse is very empowering because from what it tells me; it tells a lot about today’s world and how we never seem to be satisfied with what we have and what were given. I also believe that we should hunger and thirst for righteousness because we should be wanting to become closer and that we should be looking for righteousness in Gods world.
Amy Hastings
ParticipantI believe there are a bunch of policies needed in order to ensure we have a strong security program. This includes having data protection as any company should have multiple ways to protect their data and their business information. Any company should also have certain people that are authorized in order to keep the data safe and not be accessible to anyone and everyone. You should also keep your passwords updated and changed regularly to ensure extra safety on your companies data.
Amy Hastings
ParticipantThere are a lot of different risks and vulnerabilities that companies face today including inside and outside threats as well as Cloud security. The inside threats include people that are capable of stealing important information and sabotaging the company as well. The external threats would include data breaches which means that people can gain access to any of the unauthorized and sensitive data. Cloud security is simply the vulnerabilities that are found in cloud environments. There are also many ways to reduce networks compromise like the strong authentication and access controls, this includes privileged and the multi-factor authentication. The privileged one is where the controls are for that sensitive data in the system. Multi-factor is the company knowing of any types of unauthorized access to the data in their systems.
Amy Hastings
ParticipantI believe I sometimes feel like I am at a place where my temptations seem to be insurmountable because some of my temptations feel as if they are close to impossible to reach. But I do know Jesus is there and it makes me believe a lot more that my temptations or goals are reachable through him and his guidance. I can proudly say Jesus has gotten me through so many things I thought would be impossible for me. I also do agree that no matter what we’re going through he will be here for us all and that if I reach high enough to achieve my goals that they will be achieved because of Jesus.
Amy Hastings
ParticipantHi Latoya, you have a TON of great information here. I also mentioned the symmetric encryption because I believe it is one of the most important ones we could have mentioned here. I like how you mentioned so much detail over the symmetric encryption as well.
Amy Hastings
ParticipantCryptography is very useful and also very important because it helps protect your data secretly by using special keys. It is also only accessible to people who are given the authorization to access this information. This is good because it ensures the safety of the data in things like emails and others. The various uses would be the symmetric cryptography meaning it is shared by the encryption as well as the decryption and that lets the data move between different platforms safely. Another is the asymmetric cryptography because this one is for the public and the private use but only those authorized can get into the private one while everyone else can only use the public one letting them communicate between each other but in a safe manner.
Amy Hastings
ParticipantYou have a great discussion, and I like all the information you have put here, I like how you mentioned the fingerprinting and the other access control types. I believe I learned more than I knew reading this!
Amy Hastings
ParticipantAccess controls in a company has a lot of roles and responsibilities but some are the authorization meaning that only certain users can access certain information depending on the permissions they have in the company. All of the access controls are used differently but the main thing it does is it helps to ensure the safety as well as the security of the company. The access control also has a role in the safeguarding sensitive information, and this helps determine who as the access, but it also limits the access depending on their jobs and what they are for.
Amy Hastings
ParticipantThe passage above tells us about God teaching to the Pharisees and the Sadducees and the “brood of vipers” is an understanding that they are mentioning the harmful actions they took. They were overpowerful but they could not keep relying on each other as Jesus is the true one to rely on with everything. Jesus has faith and love for everyone even if they are labeled as a viper. He pushes us and drives us to live for more.
Amy Hastings
ParticipantGreat discussion, I agree with you I also think encryption is a very important network security to use for a business setting. I like how you mentioned the device hardening one as well and you have great information over everything you wrote here.
Amy Hastings
ParticipantA company can implement a lot of different types of network security but I’m going to mention two I think are the most important. Which are firewalls and data encryption, the firewalls are one of the more commonly and known one as it helps keep your information and network from the untrusted networks, like a wall hence the name firewall. Encryption is important to be mentioned because it keeps your information from the other outside and untrusted networks safe for you to use them wen needed.
Amy Hastings
ParticipantJason, I liked your discussion post, and you have provided great information on some of the storage options. I also like that you included the different RAID options. Your example is a good one as well.
Amy Hastings
ParticipantThere are multiple types of data storage methods but the two I want to mention would be cloud storage and primary storage. Cloud storage is used to store your data that is typically kept on a mobile device such as your phone, hence iCloud on iPhone. This allows you to store information such as passwords, emails and more that you’d need more often. Primary storage is used to keep your information stored from a computer and it is much faster. This also keeps your apps stored and updated and lets you access your data faster than some of the others.
-
AuthorPosts