Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Ashly Jackson

Forum Replies Created

Viewing 15 posts - 61 through 75 (of 83 total)
  • Author
    Posts
  • in reply to: OCU C)OST A Discussion Lesson 01 #87128
    Ashly Jackson
    Participant

    I love how you wrote about operating systems, and you have elaborated well enough to understand. Also, your points are very valid, which should be addressed, and individuals should know about operating systems like Linux, windows, and so on as you stated. Linux facilities with powerful support for networking. Linux has been a popular choice for server operating systems due to its outstanding reliability. It is incredibly secure, which makes it well-suited for mission-critical tasks. Individuals must gain knowledge about operating systems which can help them to understand better in every way. All the best for your discussion and well-written.

    in reply to: OCU C)OST A Discussion Lesson 01 #87127
    Ashly Jackson
    Participant

    The four diverse types of operating systems are MS-DOS, Windows Operating System, LINUX Operating System, and Solaris Operating System. The purpose of MS-DOS is permitting the user to navigate, open, and if not manipulate files on their computer from a command line rather than from a GUI like Windows. Moreover, the purpose of Windows Operating System is to manage all computer resources and supplies services to applications running on it. This operating system was evolved by Microsoft and released in 1985 under the name Windows 1.0. The purpose of LINUX Operating System is to each version of the LINUX operating system to manage hardware resources, launches, and manages applications, and supplies some sort of user interface. Thanks to a huge developer community and a wide range of distributions, there is a version of LINUX available for almost any task, and Linux has permeated many areas of computer science. Lastly, the purpose of Solaris Operating System is to utilize cloud computing environments as a platform for walking digital machines and web website hosting cloud-primarily totally based applications.

    in reply to: OCU C)OST A Devotion 01 #87062
    Ashly Jackson
    Participant

    Yes, 8 years of friendship was ruined because they talked behind me, and I heard what they said. It was extremely hurtful for me, and I was unaware of their actions. I lost my appetite, peace of mind, and never trusted anyone. The words they said about me were poisonous words which stung me terribly and manipulated my other childhood best friend against me. I become hurt broken, and I prayed to God crying to heal my pain and give me the strength to handle this terrible pain. Years have passed and I forgave them because it proves to me that I have a big heart. In Matthew 6:14-15, “For if you forgive other individuals when they sin against you, your heavenly Father will also forgive you. But if you do not forgive others their sins, your father will not forgive your sins.”

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #84000
    Ashly Jackson
    Participant

    Your writing is true, and I agree with your points which are important in your writing. People’s carelessness can lead to damage to the company’s policies. People should not be given a chance to hack into the company’s systems and collect what they want. I really like your writing and all the best.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #83999
    Ashly Jackson
    Participant

    You wrote some great points which should be addressed in this writing, and I really appreciate you did that. The protection should be complex so that the hacker will not hack into the accounts or will not investigate company’s important things. I have learned some new things from your writing which helped me a lot.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #83998
    Ashly Jackson
    Participant

    The cyber pick is now on one team. Leverage our cross-industry mission recognizing, proven approaches, and turnkey solutions to transform how nations approach cybersecurity. They support a few of their country’s most important missions. A holistic view of the cyber landscape and intelligence craft unlocks powerful defensive solutions to position full-spectrum cyber abilities with confidence, accuracy, and speed. The biggest, most harmful, and most prevalent threat to small businesses is phishing. Phishing accounts for 90% of all security breaches companies face, and last year increased by 65%, causing more than $12 billion in business losses. Every business need defense against cyberattacks and security threats. Cybercrime and malware are a persistent threat to anyone on the internet, and data breaches are time-consuming and expensive. Workplace security protects employees and physical offices from damage. A workplace security main plan should protect a company’s critical data and information from hackers and other cyber security threats.

    in reply to: OCU C)SP D Week 05 Devotion #83996
    Ashly Jackson
    Participant

    Whatever you find satisfying will remain an excellent pursuit in our life. Achievement becomes a swallowing pain in our life when people believe it will bring us satisfaction. Therefore, hunger and thirst for righteousness means that we must seek righteousness urgently. “Blessed are those who hunger and thirst for righteousness” is central to the Beatitudes. When apostles see their sins and weaknesses, they will request to God to meet their righteous needs. In the Christian faith, hunger for God means eating the Bread of Life, Jesus Christ. The Word of God is the supreme food of true gratification for our souls and minds. Our hunger and thirst will be satisfied in Christ, not only on earth yet also in the world to come. Our spiritual thirst can talk to our personal concerns and places in the world where individuals need rebirth, hope, and help from suffering. The waters of the world and our souls.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #83875
    Ashly Jackson
    Participant

    That is a great writing about OWASP, and you have used some great points that goes well with your writing. Your writing is noticeably clear about what you are trying to say, and it is immensely helpful for me personally to get to know more about OWASP. Your writing helped me to understand better about OWASP.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #83843
    Ashly Jackson
    Participant

    I love your writing about OWASP, you have done an excellent job. Your points are amazing, and it gives me more information to understand about OWASP. Thank you for adding more information, it helps me a lot and understand more about OWASP. I have gained some knowledge by reading your writing.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #83841
    Ashly Jackson
    Participant

    A security principle that aims to keep privacy, integrity, and accessibility by being protected by default and quickly restoring software resilience after design or else execution failures. Based on the idea of software security, crash secure is often used interchangeably with fail safe, whichever derives from physical security terminology. This security principle states that the resilience of software against hacking attacks depends steadily on shielding the most vulnerable components such as code, services, and interfaces. Programmers must design manage to prevent their applications from being abused by various kinds of spiteful actors such as disgruntled staff members and programmers, drive-by attacks that free viruses or else trojan attacks onto the system, and criminal organizations with malicious intent. The most risk-taking type of attacks developers need to protect themselves from programmers. This is the reason they typically have an elevated level of connection to sensitive systems. Programmers can use the OWASP principal techniques to protect against this kind of attack.

    in reply to: OCU C)SP D Week 04 Devotion #83832
    Ashly Jackson
    Participant

    Everyone is tempted, but it is not a sin by itself. You may feel blamed about the temptation, or else you might feel the magnitude and persistence of the temptation. We are tempted when our wish lead us away from God’s desires. Sure, a few things hit us unexpectedly, but there are times when we adapt our imagination to see what we really want instead of what God wants. Why did God bring me here? And when Bible says that he was led “by the Spirit” into the wilderness to be tempted, what regarding Jesus own temptations? It is at times used to “test,” yet even Jesus educate us to pray not to be tested. We are never trapped by temptation, and we are swearing that we are never alone in any kind of temptation, and that our God will never approve us to be tempted more than we can bear.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #83760
    Ashly Jackson
    Participant

    You have written some great points and I really think that more people should educate themselves regarding these social media problems. People should create awareness or create a device that protects individuals’ personal information. Moreover, strangers must not be allowed to access personal information, and the protection should be strict.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #83758
    Ashly Jackson
    Participant

    I love your valid points about smartphones, and I get more information from your writing. Using phones can be dangerous but there is a limitation to everything. People should encourage each other to reduce using phone and posting personal information in social media which is dangerous. Parents should train their kids from the beginning and teach them the dos and don’ts.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #83755
    Ashly Jackson
    Participant

    Nowadays, mobile devices are key to communicate with their loved ones, economy, social life. This makes it a profitable target for cybercriminals. Even if people are using a Google Android or Apple IOS smartphone, attackers are continuously progressing their strategy to gain entry. This involves everything from simple spam and spiteful links sent via social media to malicious software that can spy on users, compromise banking apps, and deliver ransomware to devices. Fortunately, people can keep their phone safe by staying instructed and taking precautions. For that reason, they have rounded up this year’s top smartphone security threats, along with skillful tips to save yourself, your phone, and your data. Individuals should read their bylaws before installing a new app on their smartphone. According to Pargman, all smartphone apps collect data from mobile phones. This information may add names, dates of birth, credit card and bank account information, location history, contact lists, photos, and more.

    in reply to: OCU C)SP D Week 03 Devotion #83712
    Ashly Jackson
    Participant

    But God said, ‘You will not die, ‘said the snake to the woman. “God realize that when you eat of it your eyes will be opened, and you would be like God, realizing good and evil.” The Old Testament informs of our ancestors Adam and Eve. They lived a completely sinless life in Paradise until a serpent tricked them into eating the prohibited fruit from the Tree of Knowledge. As penalize for their misbehavior, God expelled them from Paradise. Increasingly, Jesus uses comparisons to help us think about our trust and specifically how we live it and show it in our daily lives. The image Jesus make use of in this verse is often associated with what is called the “fruit of faith.” There is a belief that fruit trees must be left unpruned for three years after planting to live their own life. But even then, we cannot enjoy the fruit until God receives what is due.

Viewing 15 posts - 61 through 75 (of 83 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .