Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Ashly Jackson

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 83 total)
  • Author
    Posts
  • in reply to: OCU C)NP A Week 05 Lesson 10 Discussion #90762
    Ashly Jackson
    Participant

    You have written valid points which are extremely helpful to understand even more. A well panned networking ensures consistent high performance, translating into seamless experiences for end users. Capacity planning helps identify areas that need additional resources or bandwidth, empowering you to optimize application delivery and cut down on latency.

    in reply to: OCU C)NP A Week 05 Lesson 10 Discussion #90761
    Ashly Jackson
    Participant

    The three networking policies are users changing their passwords on a regular basis. Attackers can often work out the new password if they have the old one. And users, forced to change another password, will often choose a ‘weaker’ one that they do not forget. A hacker may attempt to access your account more than once over a period. Changing your password often reduces the risk that they will have frequent access. Second is users cannot connect unauthorized equipment to the network, such as USB memory sticks, smartphones, and tablets. The most well-known security risk associated with USB flash devices arises when the device is misplaced and 90 percent of employees utilize USB drives in the workplace, they are an attractive target for cybercriminals. Lastly, level of access is given, which allows only authorized users to access sensitive data and a regular backup procedure is in place. They are also known as security labels, permissions, roles, rights, or privileges. Access levels are often used to determine whether someone should be able to view certain documents or perform certain tasks.

    in reply to: OCU C)NP A Week 05 Lesson 09 Discussion #90760
    Ashly Jackson
    Participant

    Great expressions on your two impressions. Sometimes networking can be harder we think but the aim is to learn good networking skills. Networking in the workplace benefits everybody involved. It is important because it helps build professional relationships, opens doors to new opportunities, and facilitates the exchange of ideas and best practices. It also aids in career development, personal growth, and business success.

    in reply to: OCU C)NP A Week 05 Lesson 09 Discussion #90759
    Ashly Jackson
    Participant

    The first and most obvious benefit is the opportunity to expand your professional network. Every new contact has a chance to become a future partner, collaborator, lead, employee, or customer. So it’s worth building a Rolodex. Networking also gives you the potential to expose your personal brand. You can build a good reputation by attending a few public events and attending networking events regularly. With enough contacts and a wide network of contacts, you could become an under-the-radar local celebrity. Meeting new people gives you the opportunity to learn something new, whether it’s a new skill or simply a new perspective on the professional world. The more people you meet, the more knowledge and experience you gain. Most networking events are informal opportunities to connect with other people. Therefore, punctuality is not a top priority. However, if the event has a schedule, please ensure proper entry. If you arrive at the event too early, when nobody is around, you might have a tough time settling into the event. If you arrive after festivities have started, people might see you differently, or worse, brand you as “the one who showed up late” before they even have a chance to meet you. When networking, it is always important to be ready to share your information and experience. Your preparedness and organization in these early meetings can go a long way in impressing potential employers. Keep multiple (fresh) copies of your resumé or samples of your work on-hand. A great way to keep your resume clean is to use a resume folder.

    in reply to: OCU C)NP A Week 05 Devotion #90757
    Ashly Jackson
    Participant

    Like sheep who know their shepherd, so the children of God, who are the sheep of God’s pasture, will know the voice of God as the Good Shepherd (John 10:27). As we spend time praying to God, waiting on Him, reading and listening to His holy words in the Bible, we begin to know His voice. Like sheep who know their shepherd, God’s children, the sheep of God’s pasture, will recognize God’s voice as the voice of the Good Shepherd (John 10:27). As we spend time praying to God, waiting on Him, and reading and listening to His holy words in the Bible, we begin to recognize His voice. Jesus took pity on them and touched their eyes. They could see it right away! Then they followed him. So Jesus took pity on them and touched their eyes. Immediately their eyes received sight, and they followed Jesus. Jesus had humble beginnings. Jesus was born into a carpenter’s family and came from a poor family of day laborers. This means that Jesus knew what it was like to live in poverty, to be hungry, to be destitute. Although Jesus is the Son of God, He chose to come to earth as an ordinary human being, just like you and me.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90596
    Ashly Jackson
    Participant

    Great explanations and users get confused between virtualization and cloud computing. While virtualization and cloud computing both create useful environments, there are key differences the two technologies. Virtualization enables you to create many simulated environments on a single physical hardware and clouds are complete IT environments that abstract, combine, and share resources across a network.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90378
    Ashly Jackson
    Participant

    Clouds deliver the added benefits of self-service access, automated infrastructure scaling, and dynamic resource pools, which most clearly distinguish it from traditional virtualization. In short, virtualization creates simulated versions of a machine’s software or hardware components, while cloud computing is a model that enables users to access a shared pool of resources conveniently. Virtualization can be part of the cloud, but cloud computing itself is an entire infrastructure built around supporting online access to applications, services, and data. As long as a provider is enabling access to resources, compute power, and/or applications through an online pathway, they’re using cloud computing. In a nutshell, virtualization is a technology that uses software to create virtual versions of a machine’s software and hardware components. Clouds are IT environments that utilize virtualization and then make those software and hardware components accessible on-demand. Simply put, the difference between on-premise vs cloud software is the location. On-premise software is installed and runs on a company’s own hardware infrastructure, and is hosted locally, whereas cloud software is stored and managed on the provider’s servers, and accessed through a web browser or other interface. It can be defined as the centralized storage of a distributed virtualized environment where a wide range of remote servers allow computer services and resources to be accessed online. A private cloud, however, is single-tenant. A private cloud is a cloud service offered only to one organization. A Virtual Private Cloud (VPC) is a private cloud within a public cloud. No one else will share the VPC with her VPC customers. – Cloud computing separates applications from the hardware, while virtualization separates the operating system from the underlying hardware. -Cloud computing provides services for web-based access, and virtualization provides services for data access through virtualized Internet connections. On desktop systems, all software updates are applied individually to each computer, so some older programs or versions may be in use. In contrast, cloud-based systems are updated centrally, so everyone has the latest version.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90377
    Ashly Jackson
    Participant

    You have included some great points. Systems hardening is a collection of tools, techniques, and best practices to reduce vulnerability in technology applications, systems infrastructure, firmware, and other areas. The goal of systems hardening is to reduce security risk by eliminating potential attacks vectors and condensing the system’s attack surface.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90376
    Ashly Jackson
    Participant

    Network hardening: Ensure your firewall is properly configured and all rules are regularly audited; secure remote access points and users; block any unused or unneeded open network ports; disable and remove unnecessary protocols and services; implement access lists; encrypt network traffic.Hardening Network Devices. Hardening network devices reduces the risk of unauthorized access into a network’s infrastructure. Vulnerabilities in device management and configurations present weaknesses for a malicious cyber actor to exploit in order to gain presence and maintain persistence within a network.Most common surface hardening methods include flame and induction hardening. In flame hardening the form of hardening is due to transformation hardening in which the surface layer is heated above the critical temperature A1 to austenitize and during subsequent quenching hard martensite is formed.Network hardening standards help guide the processes used in optimizing network security across your organization’s cybersecurity infrastructure. Within a cybersecurity program, network hardening helps mitigate security risks related to: Vulnerabilities in network configurations and devices.OS hardening usually involves patching and securing the operating system of a server. Operating system vendors, such as Microsoft, typically release updates, service packs, and patches that users can install manually or automatically. Domain controller hardening involves hardening the servers running Active Directory to reduce the risk of unauthorized access, data breaches, etc., and service interruptions. Configure your firewall – Configure your firewall to only accept traffic from the ports you want. Restrict access – Leverage user roles defined in customer systems. Allow access to specific resources only to those who absolutely need them. A network switch is a hardware component responsible for forwarding data from a network to a destination endpoint through packet switching, MAC address identification, and multiport bridging systems. Network switches connect devices on a local area network (LAN) and send data packets to and from them.

    in reply to: OCU C)NP A Week 04 Devotion #90375
    Ashly Jackson
    Participant

    I am a good person and my parents raised me very well. However, it is tough to define what a good person is, but I am an example of a good person because deep down in my heart I knew I am better than anyone else. For me None of us will ever be “good enough”, save through the merits and mercy of Jesus Christ but because God respects our legacy, we also cannot be saved without our trying. That is how the balance between grace and works. I can have hope in Christ because he wants to help and change us. We help build the kingdom of God by living righteously. Individuals and families are strengthened by activity in the church. We should willingly serve wherever we are. Blessings come as we serve in the kingdom of God. Many people think they can be worthy enough for heaven by simply working harder to be better, to be more righteous, or to be more holy.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #89961
    Ashly Jackson
    Participant

    I agree with you, and you have clearly made your points. One of the most common threats faced by organization employees with a negative approach. Remember; nothing can harm an organization more than unfaithful employees. Believe me, employees who attend the office just to earn their salaries are in fact the biggest threat to an organization.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #89960
    Ashly Jackson
    Participant

    An insider threat occurs when individuals close to an organization who have authorized access to its network intentionally or unintentionally misuse that access to negatively affect the organization’s critical data or systems. Careless employees who do not follow their organizations’ business rules and policies cause insider threats. For example, they may inadvertently email customer data to external parties, click on phishing links in emails or share their login information with others. Contractors, business partners and third-party vendors are the source of other insider threats.
    Some insiders intentionally bypass security measures out of convenience or ill-considered attempts to become more productive. Malicious insiders intentionally elude cybersecurity protocols to remove data, steal data to sell or exploit later, disrupt operations, or otherwise harm the business. Viruses and worms are malicious software programs (malware) aimed at destroying an organization’s systems, data, and network. A computer virus is malicious code that replicates by copying itself to another program, system, or host file. It remains inactive until someone activates it, either intentionally or accidentally, and spreads without the knowledge or permission of the user or system administrator.
    Computer worms are self-replicating programs, meaning they do not need to copy themselves into a host program and do not require human intervention to spread. Its main function is to infect other computers while remaining active on the infected system. Worms often spread automatically and through parts of the operating system that are invisible to the user. Once a worm enters your system, it immediately begins replicating and infecting computers and networks that are not properly protected.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #89959
    Ashly Jackson
    Participant

    Well explained about LAN standards and your points are good. There are many diverse types of Wi-Fi standards. Your router, laptop, tablet, smartphone, and smart home devices use different wireless standards to connect to the internet. Wireless standards change every few years, too. Updates bring faster internet, better connections, more simultaneous connections, and so on.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #89958
    Ashly Jackson
    Participant

    Most wireless LANs (WLANs) are based on the IEEE 802.11 standard, which defines a physical layer medium that uses modulation schemes to encode data onto a wireless carrier signal. Wi-Fi 5 only operates in the 5 GHz band, but in mixed mode it can use the older standard (802.11g/n) 2.4 GHz band. Ratified in 1999. The 802.11a standard uses the same core protocol as the original standard, operates in the 5 GHz band, and uses orthogonal frequency division multiplexing (OFDM) with 52 subcarriers and a maximum raw data rate of 54 Mbit/s. We provide a realistically achievable net. A medium WLAN throughput of 20 Mbit/s is standardized in IEEE 802.11 and operates in two basic modes: infrastructure mode and ad hoc mode. Infrastructure mode – A mobile device or client connects to an access point (AP), and the AP connects to the LAN or Internet via a bridge. Clients send frames to other clients via the AP. A local area network (LAN) is a communication system that enables connectivity and resource sharing between independent devices within a medium-sized geographic area. Distributed data interface network. Wireless LAN (WLAN) is a wireless computer that uses wireless communications to connect two or more devices to form a local area network (LAN) within a limited area, such as a home, school, computer lab, or campus. It’s a network. Or an office building.

    in reply to: OCU C)NP A Week 03 Devotion #89957
    Ashly Jackson
    Participant

    I do not have any bad addictions and I am good mentally and physically because of God’s blessing. I pray, eat healthy foods, workout every weekday, and do many positive things to keep me occupied. My parents never let me do any terrible things and they taught me very well. One answer is that God calls us to a relationship with Him through obedience. By following God’s call to care for this earth, we can learn more about Him and expand our understanding of His heart and desires for our lives. Obedience also leads to personal growth. And in return, God will bless us forever in heaven, free from sin, temptation, and hardship. Jesus is important to us because through His Atonement, teachings, hope, peace, and example. He helps us change our lives, face our trials, and move forward with faith as we journey back to Him and His father.

Viewing 15 posts - 1 through 15 (of 83 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .