Mile2 Cybersecurity Certifications

Cybersecurity Certifications

David Young

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 22 total)
  • Author
    Posts
  • in reply to: OCU C)SP D Week 05 Lesson 11 Discussion #84017
    David Young
    Participant

    Thomas,
    You are completely correct, there are quite a few different security policies a company could set into place to protect its data/network. You did a good job succinctly outlining and explaining a few of them. During your research did you discover any security policies that you did not previously know about? Were there any that particularly struck you as being effective or useful? I thought that the “Acceptable use policy” was a really obvious yet effective policy.
    Thanks!

    in reply to: OCU C)SP D Week 05 Lesson 11 Discussion #84003
    David Young
    Participant

    Nathanael,
    You did an excellent job listing for us the different security policies a company can implement. You did so in a succinct yet accurate manner, I mean you spent very few words explaining, and yet I feel as though I understand everything you are talking about. Good job! It is not easy to remain understanding through brevity. Of all of the policies you listed which one do you believe to be the most effective in creating a secure network? Why?
    Thank you!

    in reply to: OCU C)SP D Week 05 Devotion #83975
    David Young
    Participant

    Mechanical? Yes, but not mechanistic. That is to say, although you are right in saying that God’s means for providing spiritual food is not ethereal and floaty nonetheless it IS spiritual in nature. This means it cannot be a purely mechanical process like eating an apple or frying an egg.

    in reply to: OCU C)SP D Week 05 Devotion #83974
    David Young
    Participant

    We live in a world that tells us to satisfy and indulge in every desire we have no matter what it is. Secularism tells us that any desire we have is natural and therefore good. This leads to much confusion. Men desire sexual relations with other men, young boys and girls hunger for pornography and anything we can crave we are told is ours for the taking. Unrestrained lust only leads to disaster and enslavement. True liberty only comes when we submit our lives to Jesus Christ. Every human being on Earth is a slave. If you are not a slave to Christ then you are a slave to sin and death. Is it not better to serve righteousness instead of wickedness? If you are going to be a slave regardless, then it is far better that you serve the Lord. Seek his kingdom and his righteousness above all else. Only in servitude to God can we ever attain true freedom.

    in reply to: OCU C)SP D Week 05 Lesson 11 Discussion #83973
    David Young
    Participant

    Any organization, company, or entity that has sensitive data it wishes to protect needs to establish policies for a strong security program. This means having strict rules organization-wide, that prevent would-be hackers and bad actors from accessing your valuable data/information. Many useful and effective policies could be applied to achieve program security, however, there are three that particularly stand out to me. First, a well-thought-out acceptable use policy. This policy outlines for its employees the acceptable uses of company equipment: what devices you can connect to, what websites you can get on, etc. A good acceptable use policy will help prevent waste and abuse of company property. Second, a security training and awareness policy. This policy would require all employees to participate in some form of IT security training during the onboarding/orientation process. This policy would help to educate employees about the fundamentals of protecting data and also keep them informed regarding company security policies. Third, a thorough change management policy. This policy would manage, review, track, and approve all changes to the information system. This policy would help to protect the company from their own employees corrupting their hardware or compromising their data and it would likewise protect the employees from accidentally downloading harmful materials.
    There are no downsides to having good security policies implemented at your business or company. Well-thought-out policies and guidelines can only protect your company and your employees from mistakes that could otherwise be avoided. What do you think? What security policies stood out to you?

    in reply to: OCU C)SP D Week 04 Devotion #83913
    David Young
    Participant

    Temptation is one of the dense swamps that every Christian must arduously trek through. Its woods are thick and its mud deep. No believer can make it out without cuts, scrapes, and stains. Yet, we are all of us called to complete this journey, to run the race set before us. How can we be obedient to a calling that we are incapable of fulfilling? The answer is glorious. We have already completed the journey. Every saint that has been reborn by the holy spirit has already completed the journey through the swamp of temptation. We have already slayed our dragons. How can this be? How can we who are so helpless when temptation rears its face possibly boast of victory? Because the victory is ours in Christ. “Therefore, if anyone is in Christ, he is a new creation. The old has passed away; behold, the new has come” (II Corinthians 5:17, ESV). This is the joy of our salvation, this is the gospel, we who were once dead in trespasses; completely incapable of overcoming our ensnaring sins, have been given life in Jesus. Because Jesus fulfilled all righteousness because he perfectly obeyed God’s law and resisted temptation we who are in Christ are covered by his righteousness. Therefore, when we are striving to resist temptation we are not striving for an impossibility. We are merely forcing the puzzle pieces to fall into place. We are making this shadow more like reality. In Christ Jesus, we are more than conquerors of all of our enemies; the world, the flesh, and the devil. We must take the warning from I Corinthians seriously: “Therefore let anyone who thinks that he stands take heed lest he fall” (I Corinthians 10:12, ESV). The key word in that verse is “He.” We do not stand but in the Lord Jesus Christ and his righteousness, we are overcomers

    in reply to: OCU C)SP D Week 04 Lesson 09 Discussion #83909
    David Young
    Participant

    Nathanael Armstrong,

    I have a couple of genuine and practical questions for you brother. It seems like you really have a grasp of the career field and if I am not mistaken, I believe you at one point said you work in the field or used to. Would you happen to know what the average joe like me can do to defend ourselves against bad actors and would-be data thieves? I mean, from what you have said in this post it really seems like nowhere is safe. Our data is at risk in practically any location that has public wifi. Are there simple actions we can take to protect ourselves?

    Thank you!

    in reply to: OCU C)SP D Week 04 Lesson 09 Discussion #83894
    David Young
    Participant

    Aaron,

    Excellent summary of Cryptography brother. Obviously, there are many different methods of cryptography and varying techniques for it. During your studying and research did any particular method/technique stand out to you? What cryptography methodology do you think is the most effective in preventing eavesdroppers and would-be hackers/bad actors? Seriously nice job covering this topic with precision and brevity.

    in reply to: OCU C)SP D Week 04 Lesson 09 Discussion #83862
    David Young
    Participant

    How do you protect non-physical material from thieves? Something like data. If you are a bank and you need to protect and guard cash or gold you have means of doing so. You hire armed guards, and you place your goods in a large, secure safe. There are many methods for protecting physical goods but overall one basic principle: make it difficult for people who want your goods to get to them. We apply this same principle to data. Any company with large amounts of personal data needs to protect that data from would-be thieves and hackers wishing to corrupt or steal it. One methodology for protecting your data is cryptography. This consists in making unique encryption algorithms that transform your data into code using different mathematical formulas. These encryption algorithms are the security guards, large security safes, and locked doors that make it difficult for would-be thieves to steal your data. Of the many types of cryptography methods, which did you find the most intriguing?

    in reply to: OCU C)SP D Week 03 Lesson 07 Discussion #83802
    David Young
    Participant

    Joseph,

    There are certainly a lot of material considerations that need to be taken into account when it comes to deciding which security control to use for your network. By material considerations, I mean physical machines that need protection. Are there other concerns that need to be taken into account when determining what controls to implement? Of the considerations, you can think of which is the most vital? Why? Thank you for the post brother!

    in reply to: OCU C)SP D Week 03 Lesson 07 Discussion #83784
    David Young
    Participant

    Nathanael,

    I like your approach with this response, right to the point. You named several control types. Including the ones you did not list, what do you think is the most important network security control? Which one is the most successful in actually securing the network? Thank you again for the post and well done!

    in reply to: OCU C)SP D Week 03 Devotion #83772
    David Young
    Participant

    When we contemplate our own sin, it is easy to become discouraged. In particular, when we consider our helplessness in obeying the law of God. Try as we might, all of us fall short of perfect obedience to God’s perfect law. If the law is perfect and we fall short, that means that the fault must be in us and not in the law or in the one who gives it. The fault solely belongs to us. The terrible part of all of this is that God is a holy God. Being holy he can do nothing else but demand absolute righteousness from his creatures, which, unfortunately, we can never achieve. Now you can see just how truly desperate our situation is. God does not wink at sin, he cannot.
    Yet, this is where the “good news” of the Gospel comes in. Although God demands perfect obedience and we cannot achieve it. God has provided Jesus Christ who did achieve perfect obedience. He is righteous, he is holy, and he is worthy of living in the presence of God. This same Jesus does not leave us in our sin and despair. Rather, he gives his righteousness to us and takes upon himself our sin. “For our sake he made him to be sin who knew no sin, so that in him we might become the righteousness of God” (II Corinthians 5:21, ESV).

    in reply to: OCU C)SP D Week 03 Lesson 07 Discussion #83771
    David Young
    Participant

    “There are many ways to skin a cat” or so the saying goes. What exactly does that mean? It means that there are a million ways to accomplish a certain task so long as in the end the job gets done. It does not matter what means, so long as in the end the cat gets skinned. Okay, this is a little more morbid than I wanted it to be. I’ll get to the point. When it comes to securing a given entity’s network, there is not a one size fits all solution. There are many security controls to put into place to achieve network security.
    When it comes to a Church you are probably safe with just having usernames and passwords, although a school may want greater privacy, so their network requires two-factor authentication, whereas a large business will probably use the whole gambit of network security controls out there. So long as the network is secure, you have achieved your goal.
    I have a friend who is the head of network security for a large non-profit organization. He said he once tested his company’s security, not through a powerful virus, insane hacking skills, or compromising the firewall, he simply called some of the employees at the company and said he was someone in security and everyone gladly gave him all of their passwords and personal information over the phone, without questions. Obtaining network security is only possible if the entire company tries to have it. What security control do you think is the most important? Why?

    in reply to: OCU C)SP D Week 02 Devotion #83691
    David Young
    Participant

    The prophecies of Jesus are among the most miraculous historical predictions in history. However, it is not only the prophecies about Jesus that establish his authority as the son of God it is also the many miracles he performed not least of all his resurrection from the dead. I am persuaded of the divinity of Jesus and I am utterly convinced that he really is the second person of the trinity, the word made flesh, the beginning and the end. Although the powerful persuasion provided by the Christian proofs is incredibly potent they are not the reason I am persuaded. They are not the reason I believe. I believe because it was a gift of God.
    Ultimately, I only believe because God has transformed my heart and renewed my mind. I believe that the Bible is God’s word because the Bible tells me that it is God’s word. I believe that Jesus is the son of God because he tells me he is in his word.
    This may seem like reasoning in a circle or pulling myself up by my own coat tail but reasoning in a circle is inevitable when it comes to ultimate questions. Namely, questions regarding ultimate authority. If I say that reason is my ultimate authority, and you ask me why and use reason to answer your question what am I doing? I am reasoning in a circle. When you ask me why I believe the Bible to be true and I open the Bible to show why I believe the Bible then I am reasoning in a circle. Suppose though that you asked me why I believed the Bible to be God’s word and I used a different authority to prove the Bible would I not be undermining the Bible as authoritative? What is more authoritative; the authority or the thing that established the authority?
    The miracles of Christ and the prophecies concerning him are tremendously encouraging but ultimately I believe by faith, not by sight.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #83689
    David Young
    Participant

    Thomas,
    Nice job summarizing the concept of injection and explaining how it is critical control. It is obvious from your post that you understand the concept really well. I learned a lot from your post. What are some procedures an organization can implement to prevent injection? Is injection simply inevitable or are there preventative measures that can be taken? Thank you!

Viewing 15 posts - 1 through 15 (of 22 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .