Amy Hastings
Forum Replies Created
-
AuthorPosts
-
Amy Hastings
ParticipantI do believe I am persuaded by this because it only makes sense if some of it was written back way before Christ was ever born. There is not really another explanation for this. I believe what is said here is true for that reason, I also believe in Christ and is words, so this is not something to be weirded out by because it only makes sense. I believe God speaks to me every day not only in words but in the actions, I see in my everyday life.
Amy Hastings
ParticipantYou have put great information, and I like that you used RAID as your topic, and I am glad to see that this is the one you used here.
Amy Hastings
ParticipantSome controls that a company can use to help serve a company’s network would be the firewalls because this is what helps the network traffic, and this can also help the traffic coming into the network. Another could be the password policies that a company has such as it can help keep them strong and up to date meaning to change them so often, so it is not at risk to be hacked. All of this and more helps to keep and secure your company’s network and are very important.
Amy Hastings
ParticipantHi Latoya, your discussion post was very informative, and I can say that while reading your post I learned new information on the OWASP principle. I like that you used the identification and authentication failures, it was informative, and you also included a lot of good information here.
Amy Hastings
ParticipantOne of the top ten OWASP security principles is the broken access control because it is what lets the hackers gain access to your important information. This can also allow the hackers to be able to take over your information and allow it to become vulnerable to them, which can lead to financial loss in the business. This is a critical control because it is easy to prevent these things if you take the correct precautions.
Amy Hastings
ParticipantI do claim Jesus as my personal Saviour, I do believe I exercise and show his spiritual gifts in everything that I do in my daily life. He is what gets me through everyday weather it’s an easy-going day or one that I feel like I cannot get through and I know it is because of his love and support to me that I do. Jesus has changed my life in so many ways and has blessed me with everything I have, and I have gotten through. He will always be the most important part of my day because he truly is the reason I can do what I do every day.
Amy Hastings
ParticipantDuring 2022 mobile devices faced a lot of potential risks like the phishing again because the phishing came from emails and people opening them on their mobile devices. Another is the data leakage as it is leaking your data onto the internet which is a huge risk mobile device users can take. The unsecured Wi-Fi connections I would say is another huge one because it can and will allow hackers to have access to your personal information and they will steal it. This all-effects mobile device users because it simply exposes all your personal information, and this can lead to financial losses.
Amy Hastings
ParticipantCompanies face a lot of risks and vulnerability when it comes to businesses including phishing as this is an online threat which can lead to companies to go through financial losses as well as the consumers losses. Another would be the ransomware and malware; ransomware can lead the entire business to be at a loss of financial problems and more. Malware is what leads to computer damage, and this allows hackers to gain access to personal and the financial information of that company. Some policies that can help to reduce a networks compromise would be the encryption because this helps to stop any hackers from gaining access or even seeing the company’s important information. Another is the firewall which is a big one because it helps keep the phishing attacks down to a controllable level. The firewall is basically a shield between the company’s device and an attack.
Amy Hastings
ParticipantSome policies that are needed to ensure a strong security program is to have a data secure policy because it helps ensure that you have a safe asset for your data, and this also helps you have access to the control systems. Another would be to have backups because it is the key to keep your data protected and it also gives you a recovery plan. You should also have an incident response policy as this helps with identification, containment, and recovery along with many other good things you need. This also does help you keep your information on your systems network and your data information as well. A remote access policy is another great policy you should have because this one allows you to connect to the company’s network from any host. This one is also used a lot for receiving and sending emails and such.
-
AuthorPosts