Mile2 Cybersecurity Certifications

Amy Hastings

Forum Replies Created

Viewing 9 posts - 46 through 54 (of 54 total)
  • Author
    Posts
  • in reply to: OCU C)SP B Week 02 Devotion #99893
    Amy Hastings
    Participant

    I do believe I am persuaded by this because it only makes sense if some of it was written back way before Christ was ever born. There is not really another explanation for this. I believe what is said here is true for that reason, I also believe in Christ and is words, so this is not something to be weirded out by because it only makes sense. I believe God speaks to me every day not only in words but in the actions, I see in my everyday life.

    in reply to: OCU C)SP B Week 02 Lesson 05 Discussion #99892
    Amy Hastings
    Participant

    You have put great information, and I like that you used RAID as your topic, and I am glad to see that this is the one you used here.

    in reply to: OCU C)SP B Week 02 Lesson 05 Discussion #99891
    Amy Hastings
    Participant

    Some controls that a company can use to help serve a company’s network would be the firewalls because this is what helps the network traffic, and this can also help the traffic coming into the network. Another could be the password policies that a company has such as it can help keep them strong and up to date meaning to change them so often, so it is not at risk to be hacked. All of this and more helps to keep and secure your company’s network and are very important.

    in reply to: OCU C)SP B Week 02 Lesson 04 Discussion #99890
    Amy Hastings
    Participant

    Hi Latoya, your discussion post was very informative, and I can say that while reading your post I learned new information on the OWASP principle. I like that you used the identification and authentication failures, it was informative, and you also included a lot of good information here.

    in reply to: OCU C)SP B Week 02 Lesson 04 Discussion #99889
    Amy Hastings
    Participant

    One of the top ten OWASP security principles is the broken access control because it is what lets the hackers gain access to your important information. This can also allow the hackers to be able to take over your information and allow it to become vulnerable to them, which can lead to financial loss in the business. This is a critical control because it is easy to prevent these things if you take the correct precautions.

    in reply to: OCU C)SP B Week 01 Devotion #99507
    Amy Hastings
    Participant

    I do claim Jesus as my personal Saviour, I do believe I exercise and show his spiritual gifts in everything that I do in my daily life. He is what gets me through everyday weather it’s an easy-going day or one that I feel like I cannot get through and I know it is because of his love and support to me that I do. Jesus has changed my life in so many ways and has blessed me with everything I have, and I have gotten through. He will always be the most important part of my day because he truly is the reason I can do what I do every day.

    in reply to: OCU C)SP B Week 01 Lesson 03 Discussion #99506
    Amy Hastings
    Participant

    During 2022 mobile devices faced a lot of potential risks like the phishing again because the phishing came from emails and people opening them on their mobile devices. Another is the data leakage as it is leaking your data onto the internet which is a huge risk mobile device users can take. The unsecured Wi-Fi connections I would say is another huge one because it can and will allow hackers to have access to your personal information and they will steal it. This all-effects mobile device users because it simply exposes all your personal information, and this can lead to financial losses.

    in reply to: OCU C)SP B Week 01 Lesson 02 Discussion #99505
    Amy Hastings
    Participant

    Companies face a lot of risks and vulnerability when it comes to businesses including phishing as this is an online threat which can lead to companies to go through financial losses as well as the consumers losses. Another would be the ransomware and malware; ransomware can lead the entire business to be at a loss of financial problems and more. Malware is what leads to computer damage, and this allows hackers to gain access to personal and the financial information of that company. Some policies that can help to reduce a networks compromise would be the encryption because this helps to stop any hackers from gaining access or even seeing the company’s important information. Another is the firewall which is a big one because it helps keep the phishing attacks down to a controllable level. The firewall is basically a shield between the company’s device and an attack.

    in reply to: OCU C)SP B Week 01 Lesson 01 Discussion #99504
    Amy Hastings
    Participant

    Some policies that are needed to ensure a strong security program is to have a data secure policy because it helps ensure that you have a safe asset for your data, and this also helps you have access to the control systems. Another would be to have backups because it is the key to keep your data protected and it also gives you a recovery plan. You should also have an incident response policy as this helps with identification, containment, and recovery along with many other good things you need. This also does help you keep your information on your systems network and your data information as well. A remote access policy is another great policy you should have because this one allows you to connect to the company’s network from any host. This one is also used a lot for receiving and sending emails and such.

Viewing 9 posts - 46 through 54 (of 54 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.