Mile2 Cybersecurity Institute

Hannah Street

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 27 total)
  • Author
    Posts
  • in reply to: OCU C)OST A Discussion Lesson 11 #112024
    Hannah Street
    Participant

    Hi Marisa! You did a good job covering the different features of the Soho router and covering the different purposes of each one. You also discussed the importance of VPNs and how they can be used. I think that this was an interesting topic for our last week of this class. Awesome job!

    in reply to: OCU C)OST A Discussion Lesson 10 #112023
    Hannah Street
    Participant

    Hi Eugene! Your discussion post was well written. You did a good job of covering different types of vulnerabilities and how they could be potentially prevented. I noticed in your discussion post that you talked about google protect play. This is also something that I discussed in my post. Good job!

    in reply to: OCU C)OST A Discussion Lesson 11 #111907
    Hannah Street
    Participant

    Soho is a router that is designed to be simpler to use and allow for the user to have more control than a typical router. The Soho router is an ethernet router. There are some features that impact how the Soho router operates. One of these features is that Soho routers have an integrated switch, which means that they use LAN, but some also have DHCP servers. If there were an issue then the controls could still be accessed if needed. Another feature is being able to expand Soho networks, but because of the number of ports there is a limit on how far the Soho network is able to expand. Another important part of Soho networks is that while it is a smaller network there is still the need for security. Soho is a good alternative for someone who is looking for something slightly different from a typical router. (Mile 2).
    References:
    Mile 2. (n.d.). Certified Operating Systems Technician.

    in reply to: OCU C)OST A Discussion Lesson 10 #111904
    Hannah Street
    Participant

    Please present at least three different emerging vulnerabilities on both mobile and physical devices and what particular countermeasures could users implement to help reduce these vulnerabilities.
    There are a number of different vulnerabilities that can happen on both mobile and physical devices. The first kind of vulnerability that can affect both mobile and other physical devices is phishing. Phishing can happen when a scammer sends a convincing text or email pretending to be a company, such as their bank or their employer in order to obtain private information. A countermeasure that can be used to prevent phishing is to tell people to never answer suspicious and unexpected emails or texts, if unsure, always contact the supposed source through normal means of communication. Another vulnerability are apps that may contain malware. Downloading an app that someone that may think is a harmless game can actually have code designed to steal things like your bank information. One way to prevent this is by making sure that the app is coming from a good source and is reliable, there are things to use to determine this like google protect play which checks to make sure the app is reliable. The third vulnerability is using something like a risky connection. This can be avoided by only connecting to reliable sources, if you are unsure whether or not the network is safe do not use it. (lookout.com).
    References:
    The silent killers: 7 examples of Mobile Device Security Risks. RSS. (n.d.). https://www.lookout.com/blog/mobile-device-vulnerabilities

    in reply to: OCU C)OST A Devotion 05 #111886
    Hannah Street
    Participant

    This devotional talks about how on this earth we will all live and we will all die. Many people worry about what happens after death and consider many different possibilities. With living on earth we can be afraid about many things, but those who have a relationship with God do not have to worry about what happens after we die. What happens to our souls after we die is for God to decide. If we believe in God and have a relationship with Him then we can trust that we will spend eternity with Him. Our eternity rests in the creator of the universe and we have been given the opportunity to have a relationship with Him when Jesus died for our sins. We not only get to have a relationship with God while we are here on earth, but we get to be in His presence for the rest of eternity in Heaven.

    in reply to: OCU C)OST A Discussion Lesson 09 #111782
    Hannah Street
    Participant

    Hi Eugene! In your discussion post you were able to discuss many different kinds of physical security and how they are used. I noticed that you discussed a security camera system. This is also something that I discussed in my post. Overall, your post was well written and had some good points.

    in reply to: OCU C)OST A Discussion Lesson 08 #111781
    Hannah Street
    Participant

    Hi Marisa! You did a good job of going into detail about some of the different ways that networks can be vulnerable. It is important to consider all of the potential downfalls of different networks. There are a range of different issues that networks can run into. Overall, you had a lot of good points.

    in reply to: OCU C)OST A Discussion Lesson 09 #111719
    Hannah Street
    Participant

    There are different kinds of physical security hardware devices, and they all have different purposes. One kind of device is security cameras; these can be used to monitor a specific area. These may be used in businesses today as a way to protect their company from people who may be trying to steal company merchandise or company information. Another kind of security hardware device are control systems that allow access to only certain people, things that may be used are things like badge readers or a biometric reader. These are used in business networks today to make sure that only the correct people are accessing restricted information and only the correct people are accessing restricted areas. The third type of physical security hardware devices are alarm systems that are put in place in order to protect businesses. These are used by many different businesses in order to prevent theft and break ins. (Securti, 2025).
    References:
    Physical security tools: Key types & management best practices. SecuriThings. (2025, April 22). https://securithings.com/physical-security-software/physical-security-tools/

    in reply to: OCU C)OST A Discussion Lesson 08 #111712
    Hannah Street
    Participant

    Networks can be vulnerable in a number of different ways including insecure technologies, physical environment, and weak documentation. Each one of these can cause the network to be vulnerable in a number of different ways. While networks can be vulnerable there are also a few different practices that can be put into place in order to try to prevent things going wrong with a network. There are a few different ways that access control can help prevent vulnerability in networks. Authentication can be very helpful in keeping track of who is accessing the network as well as only letting them have access to what they are supposed to. Multifactor authentication means that the user needs 2 different ways of authenticating their identity in order to login in. On the flipside, there is also single sign on, this requires signing in one time and it allows access to the group of services. The last thing that can be used to protect a network is an access control list, which can be used to prevent users from accessing unwanted websites that can damage the network. (Mile 2).
    References:
    Mile 2. (n.d.). Certified Operating Systems Technician.

    in reply to: OCU C)OST A Devotion 04 #111678
    Hannah Street
    Participant

    This devotional talks about how there are a number of different religions that all claim to be the right or the true one. I recently took a class that covered different types of religions including Christianity. I think that by taking this class it allowed me to strengthen my faith because I was able to see outside perspectives and different worldview points. It is important to have a good and solid relationship with Jesus because He is the true savior. God created everything for us and we would not be here without Him. Jesus decided to die on the cross for us so that we could be forgiven for our sins, and this is something that we could never earn. Since Jesus died for us and we are able to have a relationship with Him we can spend eternity with Him. No matter how uncertain life may seem we can know that God is always in control.

    in reply to: OCU C)OST A Discussion Lesson 07 #111588
    Hannah Street
    Participant

    Hi Matthew! Your discussion post was well written and had a lot of good points. You were able to clearly lay out different types of virtualization technology and the purpose that they serve as well as the pros and cons of each. With having your discussion post well-structured it made for an easy read. Good job.

    in reply to: OCU C)OST A Discussion Lesson 06 #111586
    Hannah Street
    Participant

    Hi Eugene! In your discussion post you were able to cover a wide range of different options that people have for data storage. One of the data storage options that you covered was Hard Disk Drives. This is one of the data storage options that you often see because people like to have a backup in case their computer crashes. Your post was well written. Good job.

    in reply to: OCU C)OST A Discussion Lesson 07 #111530
    Hannah Street
    Participant

    There are a few different kinds of virtualization technology, such as application virtualization and desktop virtualization. Application virtualization is when people are able to use certain applications without having to install them on their server. When using application virtualization your information is still saved with the application that you are using and the settings are still being used, but the information is being run through the web browser that you are using instead of having to download that particular application. Pros to this user is that you can use the application without having to download it and it saves your information. Cons are that you may run into issues with using the application on the website and it could be less secure. Desktop virtualization is when you can create a desktop that can be used on a wide range of devices. Pros of this virtualization is that you can use that desktop in a number of different devices. Cons of this is that it makes your desktop less secure because it is on multiple devices. (GeeksforGeeks, 2025).
    References:
    Virtualization in cloud computing and types. GeeksforGeeks. (2025, September 2). https://www.geeksforgeeks.org/cloud-computing/virtualization-cloud-computing-types/

    in reply to: OCU C)OST A Discussion Lesson 06 #111529
    Hannah Street
    Participant

    There are a number of different kinds of data storage, and they all serve different purposes. The three main different kinds of data storage are DAS, NAS, and SAN. The first type of data storage is DAS, which stands for Directly Attached Storage. This is when the server is directly connected to the storage with a USB cable. DAS is used for connecting one server to a storage container. The second kind of data storage is NAS or Network Attached Storage which is when computers can share through the network. NAS can be used with multiple different servers. The third kind is Storage Area Network or SAN. By using SAN a handful of different servers can all get storage, it is similar in setup to NAS. There are many different examples that fall under each of one of these categories. Each of these create different opportunities for the users with their specific purposes. (Hasen, 2021).
    References:
    Hasen, A. (2021, March 26). Storage types (DAS, Nas & San). Networkwalks Academy. https://networkwalks.com/storage-types-das-nas-san/

    in reply to: OCU C)OST A Devotion 03 #111494
    Hannah Street
    Participant

    This devotional talks about how important it is to have faith. Our faith is the foundation of our relationship with God. We need to recognize the importance of faith in the good times and in the bad times. We will all go through hard times in our lives. In the hard times in life are the times when our faith is truly tested. These are the times when we need to trust God the most even when it feels like everything is going wrong. Our faith in God needs to have a firm foundation so that when something does go wrong, we can turn to Him in our time of need. We need to know that God is in control, and He will be with us and guide us. In the good times and the bad times, we need to make time to grow our relationship with God whether that is reading our Bibles or spending time in prayer.

Viewing 15 posts - 1 through 15 (of 27 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.