Mile2 Cybersecurity Institute

Carlos Martes

Forum Replies Created

Viewing 15 posts - 31 through 45 (of 139 total)
  • Author
    Posts
  • in reply to: OCU C)ISSO A Discussion Lesson 06 #111336
    Carlos Martes
    Participant

    An Operations Security Manager plays a vital role in keeping an organizations systems and data safe through daily oversight and strong security procedures. The main responsibility of this role is to protect the organizations systems, networks, and information through consistent monitoring and proper security practices. This position manages logs and records to identify unusual activity and ensures all information is stored and reviewed correctly. Another key duty is overseeing the changes are documented, approved and completed safely without creating new risks. The Operations Security Manager is also responsible for patch management. This includes installing updates, fixing vulnerabilities and ensuring all systems stay current. Access rights are another important area, as this role sets permission levels, removes unnecessary access and ensures only right people can reach sensitive information. Overall, this position supports daily security operations and strengthens the organizations protection.

    in reply to: OCU C)ISSO A Discussion Lesson 05 #111334
    Carlos Martes
    Participant

    For this lesson, I chose to focus on NIST Cybersecurity Framework and ISO.IEC 27001, since both are widely used to strengthen an organizations security posture. The NIST CSF is built around five core functions which are identity, protect, respond and recover. It gives organizations a clear roadmap for understanding risks, setting controls and improving security overtime. One thing i appreciate about NIST is that it is flexible and can be adapted to different environment,, whether government or private sector. ISO 27001 on the other hand, is an international standard that focuses on building information security management system. It emphasis continuous improvement, documentation and management. Organizations that follow ISO 27001 often seek certification to show that their security practices meet global standards. Both frameworks complement each other by promoting structured security processes and stronger risk awareness.

    in reply to: OCU C)ISSO A Discussion Lesson 04 #111244
    Carlos Martes
    Participant

    Hello Isabelle!

    You explained the access control models really well. I agree that discretionary access control is flexible but less secure, while mandatory access gives stronger protection for sensitive data. Role based access makes sense for big organizations because it keeps everything organized. Good breakdown of how each model works and why they matter!

    in reply to: OCU C)ISSO A Discussion Lesson 03 #111243
    Carlos Martes
    Participant

    Hello Joseph!

    Great input! Identity management and authentication helps keep data safe. Authentication can be based on something you know, have or are basically. Single sign on lets users log in once to access many resources. Access control monitoring check for unusual activity. These tools work together to make systems secure and easy to use.

    in reply to: OCU C)ISSO A Discussion Lesson 02 #111242
    Carlos Martes
    Participant

    Another good input Mjulius,

    I will say that information security management protect important data and systems. It focuses on the CIA Triad, which is confidentiality, integrity, and availability. Controls like policies, training, firewalls and physical security help reduce risks. Policies guide employees on what to do. When everything works together the company stays safe and runs smoothly.

    in reply to: OCU C)ISSO A Discussion Lesson 01 #111241
    Carlos Martes
    Participant

    Good input Mjulius!
    Risk management means finding what could harm an organization and choosing how to protect it. Risk assessment looks for threats, weakness, and the damage they could cause. After understanding the risk, we decide how to handle it, reduce it, and then avoid it by transferring it with insurance or accept it if its low.

    in reply to: OCU C)ISSO A Discussion Lesson 04 #111189
    Carlos Martes
    Participant

    Access control is the process of making sure only the right people can access certain information, systems, or physical areas. One important characteristic is identification, in which a user must claim who they are, such as with a username or ID. The second is authentication, which confirms that identity using passwords, PINS, or biometrics. Another key characteristic is authorization, in which determines what a user is allowed to do once they are logged in. Finally, accountability ensures all user actions are tracked through logs and monitoring. There are also threats to access control. One common threat is password attacks, where attackers try to guess or steal login credentials. Another threat is social engineering, tricking users into giving up secure information. Privilege escalation is when an attacker gains higher access than they should. Lastly, insider threats happen when someone within the organization misuse their access on purpose or accidentally.

    in reply to: OCU C)ISSO A Discussion Lesson 03 #111186
    Carlos Martes
    Participant

    Identity management, authentication techniques, single sign on, and access control monitoring all work together to protect a system and make sure the right people get the right access. Identity management is the process of creating, storing and managing user accounts so the system knows who each user is. Authentication techniques like passwords or biometrics, verify that the user is truly who they claim to be. Single sign on makes this process easier by allowing a user to log in once and automatically access multiple systems without repeating the login steps. Access control monitoring keeps track of who is accessing what, helping detect unusual or unauthorized activity. All of these concepts share the same goal, which is improving security while keeping access simple for users. The text and video both highlight how strong authentication and proper identity management reduce risk, while monitoring and SSO help maintain smooth and secure operations across an organization.

    in reply to: OCU C)ISSO A Devotion 01 #111158
    Carlos Martes
    Participant

    I strongly believe that God picks people who are destined to carry out His mission, even if they have not their purpose. The gifts the we have may be completely to others, but it indeed shows that He created us uniquely, in which through Him, we are able to discover that gift. Some are born with it naturally, but for others, I think that He shapes us first or molds us into what we are destined to do, and only then once we are fully matured in our spiritual journey, He will reveal that road for us. It doesn’t matter whether you are poor or rich, and we should not have perspective on others regarding to our flesh.

    in reply to: OCU C)ISSO A Discussion Lesson 02 #111157
    Carlos Martes
    Participant

    Information security management is essential to the success of any company because it protects the valuable data, ensures business continuity, and builds customer trust. One key factor is policy, which sets clear rules and expectations for how information and technology resources are used and protected. Strong policies help employees understand their responsibility. Another important element is human resources, since trained and aware employees Confidentiality ensures that only authorized people can access data, integrity keeps are the first line of defense against threats like phishing or social engineering. Lastly, the CIA Triad in which stands for Confidentiality, Integrity and Availability is the foundation of information security. Confidentiality ensures that only authorized people can access data; integrity and keeps information accurate and unaltered, and availability makes sure systems are up and running when needed. Together, these principles and practices allow a company to operate safely, meet it’s goals and respond effectively to security challenges.

    in reply to: OCU C)ISSO A Discussion Lesson 01 #111155
    Carlos Martes
    Participant

    Risk Manager is vital for a Systems Security Officer because it helps identify, assess, and control potential threats before they impact an organizations assets. Every organization has valuable assets, such as data, hardware, and networks that must be protected. By conducting a risk assessment, we can measure the likelihood and impact of threats, such as cyberattacks, or system failures. Once we know the level of risk, we can apply security controls like firewalls, encryption, or access control policies to reduce it. The goal of risk mitigation is not to eliminate all risk but to manage it to an acceptable level that aligns with the organizations tolerance. Without effective risk management, assets could be exposed to vulnerabilities, leading to data loss, financial damage, or reputational harm. Therefore, consistent monitoring and updating of controls ensure the organization stays protected against evolving threats.

    in reply to: OCU C)SP D Week 05 Lesson 11 Discussion #110938
    Carlos Martes
    Participant

    Hey Caleb,
    Strong security policies protect organizations from cyber threats. Access controls ensures only authorized users access data, while password management and multifactor authentication add extra protection. An incident response plan helps handle breaches quickly. Combined with data backups and employee training, these measures keep systems secure and minimize risks from attacks.

    in reply to: OCU C)SP D Week 05 Lesson 10 Discussion #110937
    Carlos Martes
    Participant

    Hello Misty,

    Modern organizations face increasing cyber threats that target vulnerabilities like phishing, malware, and unpatched systems. Implementing multi-layered defenses such as MFA, user access controls, updated software and employee awareness is essential. Technologies like IDPS and advanced endpoint security strengthen protection, helping businesses detect, contain and prevent attacks before major damage occurs.

    in reply to: OCU C)SP D Week 05 Lesson 10 Discussion #110774
    Carlos Martes
    Participant

    Companies today face many cybersecurity risks such as phishing, malware, ransomware, insider threats and data breaches. These attacks can lead to stolen data, financial loss, and even damage to reputation. One major vulnerability comes from weak passwords, unpatched systems and lack of employee awareness. To reduce these risks, organizations should create strong security policies, such as enforcing multifactor authentication, using firewalls and antivirus protection and regular updating software. Employee training is also critical to help staff recognize suspicious emails or links. Companies should perform regular security audits and backups to recover data in case of an attack. Having an incident response plan ensures a quick reaction to any breach. By combining organizations can greatly lower their chances of network compromise and protect sensitive data from modern cyber threats.

    in reply to: OCU C)SP D Week 05 Devotion #110773
    Carlos Martes
    Participant

    This world indeed leaves us wanting more, more money, food, pleasure and other miscellaneous things. I can honestly say that there are times when wanting “more” comes into mind. Having to remind myself that being with the Father and His incredible blessings will satisfy our soul. We crave for His word, to be with Him and share the gospel to all who are in that sense of depravity. For in this world, everything is only temporary. My only goal in this life is to be able to share the Good News to all and that they experience the same hunger and thirst for His righteousness and beat the flesh once and for all.

Viewing 15 posts - 31 through 45 (of 139 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.