Mile2 Cybersecurity Certifications

Cybersecurity Certifications

bbinegar@ohiochristian.edu

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 16 total)
  • Author
    Posts
  • in reply to: OCU C)OST C Devotion 05 #94465

    I’ve heard this verse many times before it truly does tell of how powerful God truly is telling you that he holds the keys to your soul meaning he could simply erase you from existence itself if he wanted to technically, he is the only one that can kill a soul. That is why it is good to fear God in reverence to show that you respect him and his will. I’ve been working to fear God and learn how to get closer to him and follow him better.

    in reply to: OCU C)OST C Discussion Lesson 11 #94464

    I can agree with you this router appears to be the best for small or big business to have. It would provide with much needed protection so. They can get the work they need done without the threat of attack.

    in reply to: OCU C)OST C Discussion Lesson 11 #94463

    SOHO is a small router manly used in an office setting It gives more control to the user so they can control there network more smoothly. This is great to protect against security and attacks. Plus, with inbuilt security measures like a firewall this router is perfect for businesses that need a secure network to work off of. It can also work with almost anything including laptops, printers, phones and cameras.

    in reply to: OCU C)OST C Discussion Lesson 10 #94462

    But remember they are coming up with ways to make it more secure like having you blink once so the system doesn’t get tricked by a mere photo of you. It provides a simple yet more secure way of protection.

    in reply to: OCU C)OST C Discussion Lesson 10 #94461

    There are many things that can cause a breach in security for mobile devices not having a lockscreen or a poor lockscreen password makes you more suspectable to attacks and people stealing your info. For computers the more common protection method would be using either an in-built antivirus protector or using a free or paid for scanner to have weekly scans to make sure no critters squeezed through your firewall into your system. Another vulnerability is facial scanners yes, they could use a photo but like the lesson said they are coming up with ways where you have to blink to avoid them tricking the scanner.

    in reply to: OCU C)OST C Devotion 04 #94311

    I’ve been raised in the church all my life I went to church as a child, and I go to church today. I can say that God walked with me and protected me as a child being a young man now, I can see that clearly, he blessed me with loving parents and with a blessed home. But recently I feel like I have fallen into the trap of Luke warmness. Having to struggle with that has been hard but I’ve been trying my best to get out of the whole it has left me in.

    in reply to: OCU C)OST C Discussion Lesson 09 #94310

    I agree any of these options would be useful for any business that is having trouble with cyber-attacks. Aswell as showing them how they can use this info to protect for themselves in the future.

    in reply to: OCU C)OST C Discussion Lesson 09 #94309

    Three examples of protection are Firewall, VPN and proxy server. Firewall is the most common and the best one to use being it’s like a giant gate that only lets certain things through while keeping all the harmful malware out such as viruses’ worms and Trojan horses. VPN is useful for the fact that it redirects you to other countries meaning domestic attackers can’t really get to you since you’re in a separate network. That also goes with a proxy server because it stops viruses from running that it detects as harmful.

    in reply to: OCU C)OST C Discussion Lesson 08 #94308

    I can agree with you this is really helpful in showing me what to do to prevent my information to be stolen by attackers. This is a well said discussion that tells us that there are threats that need to be learned about to fight against.

    in reply to: OCU C)OST C Discussion Lesson 08 #94307

    Three different errors could be human error outdated technology or physical environment. Old networks are highly susceptible to attacks and can easily be hacked using brute force or any other hacking method. The best ways to defend against them would be firewalls and security scans that come with your computer. Aswell as keeping up to date with current technologies can reduce your risk of being hacked. Even still it’s always good to have a backup plan if things go south.

    in reply to: OCU C)OST C Devotion 02 #93882

    I would describe myself as a patient person I am complimented on my patience by my boss and the customers I help. I’m usually a very introverted person as I do not speak much and I’m shy around people in many ways. There are times I see it as a weakness and times I see it as a strength. I’m also considered a kind person even though I can be quite moody at times. I normally don’t judge if I do judge its silent, but I’ve been working on not judging people much and trying to have a more open mind in situations.

    in reply to: OCU C)OST C Discussion Lesson 05 #93834

    Just as Jacob has said there are three most commonly known encryptions are WPAp WPAe and WPS. All three have different uses and pros and cons. First WPAp or WPA personal is only used at an individual sense being used in a single home or on a single laptop. WPAe or WPA enterprise is mainly used for big business and companies being used for sales accounting and things all having to do with a big business and company. WPS has been known to be less secure, so it’s not mainly used by many. It also increases the risk of hackers and malware infiltrating your computer.

    in reply to: OCU C)OST C Discussion Lesson 04 #93833

    TCP is a communications standard that enables application programs to communicate with and exchange messages over a network. It also organizes data to make it easier to move from a server to a client. It guarantees the integrity of the data being sent. IP or internet protocol is similar to TCP, but it lacks the organization methods of TCP sending messages without organizing it risking the data’s integrity. In summary TCP/IP is the foundation of the internet allowing multiple devices to communicate all at once and using a common language that they all can understand.

    in reply to: OCU C)OST C Discussion Lesson 03 #93734

    There are 6 total networks that are most commonly used such as LAN, PAN, WAN, CAN, MAN and SAN. The network LAN connects computers in small areas like housing and a singular building. WAN connects computers like between nations. PAN connects an extremely small areas such as between houses. CAN connects computers through a college campus or universities. MAN, controls most of the city networks inside and around cities. And finally, SAN is used to connect between storage devices like USB and other kinds of drives.

    in reply to: OCU C)OST C Discussion Lesson 02 #93733

    A command line is a text-based interface within an operating system. It acts as bridges between the user and the operating system, allowing you to issue commands onto the system. There are a variety of commands that can be used such as mkdir which creates a new directory, echo which displays text or variables and curl which allows you to retrieve data from URLs.

Viewing 15 posts - 1 through 15 (of 16 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .