Mile2 Cybersecurity Institute

Isabelle Tubbs

Forum Replies Created

Viewing 15 posts - 121 through 135 (of 144 total)
  • Author
    Posts
  • in reply to: OCU C)OST C Discussion Lesson 09 #105719
    Isabelle Tubbs
    Participant

    Businesses today need physical security hardware devices to maintain security and safety of data and information. Three tools include intrusion detection systems, firewalls, and multi-factor authentication.
    An intrusion detection system (IDS) examines the traffic on the network and then sends out an alert if it finds any malicious activity or unauthorized access (GeeksforGeeks, 2025). This is an important system to install for businesses who need to know when any attacks or unauthorized accesses happen on the system. Likewise, having a physical detection system, like surveillance cameras and sensors, is beneficial for business locations (Avigilon, n.d.).
    However, to prevent attacks in the first place, firewalls are important tools for controlling the incoming and outgoing traffic. They are used to deny access to malicious users or software while also allowing known objects in. Although an intrusion detection system is helpful for alerting businesses of attacks, it is also good to have systems in place that prevent such things.
    Another method for security is the way authorized users are authenticated for access. Previously in this course, we learned how multi-factor authentication can be more secure for authenticating users. It can use information (like a password), or an object (like access to an email), etc. Using more than one method can help businesses be more secure because it requires more than just a password to get in to access important information. This can apply to logging in online or even for accessing a secure building (Avigilon, n.d.).
    References
    Avigilon. (n.d.). What is physical security? Controls, methods, and measures for commercial buildings. Retrieved May 2, 2025 from https://www.avigilon.com/blog/physical-security-guide#key-physical-security-measures
    GeeksforGeeks. (2025, April 28). Intrusion Detection System (IDS). https://www.geeksforgeeks.org/intrusion-detection-system-ids/

    in reply to: OCU C)OST C Discussion Lesson 09 #105720
    Isabelle Tubbs
    Participant

    Hello, Caleb! Great evaluation of some physical tools for the protection of businesses. I agree that studying this is an important aspect of security. Camera systems are a good way to send alerts of intruders and to also keep evidence of it. Key cards do have a disadvantage that they sometimes need to be fixed more often than traditional keys, but since they are not easy to copy, they do add more security.

    in reply to: OCU C)OST C Discussion Lesson 08 #105679
    Isabelle Tubbs
    Participant

    Great evaluation of network vulnerabilities and possible solutions or controls. What I found particularly interesting was that you brought up using a different network, specifically using them on insecure public network connections. This shows the importance of educating users about their technology and network connections. Public networks may seem more convenient, but they are not the safest. Like you mentioned, encryption and VPN connections are good actions to take.

    in reply to: OCU C)OST C Devotion 04 #105645
    Isabelle Tubbs
    Participant

    Jesus’s authority shows that He is both fully man and fully God. He has the authority to forgive sin, and one example of this is found in this week’s passage. The Pharisees condemned Jesus for saying He could forgive sins because only God can forgive sin. However, this was exactly the point. Jesus dwelled on the earth to be a perfect example for us and to be a perfect sacrifice so we could be forgiven. At the same time, He is the Son of God. His power is amazing and cannot be fully fathomed.

    Others may present other religions, but the Lord has shown that He is the One with true power. He is the one true God, the King of kings, and the Lord of lords.
    What is great in this week’s passage is that Jesus not only forgives the man, but He also heals him too. He sets him free spiritually from sin and physically from a disability. Jesus came to bring us true freedom.

    in reply to: OCU C)OST C Discussion Lesson 08 #105644
    Isabelle Tubbs
    Participant

    Hello, Carlos! Yes, if a hacker or a malicious software gains any type of access to a system, this is a huge threat. However, like you mentioned, keeping things up to date and implementing strong policies and protocols can reduce the level of risk. I also would like to add that educating users on safe online practices could prevent unintentional installation of malware.

    in reply to: OCU C)OST C Discussion Lesson 08 #105632
    Isabelle Tubbs
    Participant

    Networks connect a user and their device, which contain a lot of sensitive data about the user and organization. As a result, vulnerabilities like insecure technologies and user behavior, as well as attack threats like malware, should be prevented.

    Malware can come in many different forms, but it is essentially a way to spread malicious software throughout a system, which could spread to other systems as well. One way to prevent the installation of malware is to have antimalware installed so that it can detect suspicious files before installation and notify the user.

    Insecure technologies could occur from older equipment and protocols. For example, using an older version of Windows could make it susceptible to forced access attacks from a rainbow table. If a more modern version of Windows was installed, it would make it more difficult for attacks to be successful. Also, updating the hardware on a device would make it stronger as well.

    The behavior of users can leave a device vulnerable if they are not educated in preventing attacks and using safe techniques while online. Teaching users how to use their devices safely would prevent threats from users such as installing malware. Additionally, restricting user controls would prevent some users from being able to install malware in the first place.

    in reply to: OCU C)OST C Discussion Lesson 07 #105604
    Isabelle Tubbs
    Participant

    Hello, Cameron! I also wrote about Storage Virtualization, and it is true that it took some time to find a con to using it. However, if a business is not willing to pay the initial cost of virtualization, then they need to decide whether or not to use it ahead of time. Although I think this would really not be an issue with large companies. Also, nice work with Desktop Virtualization. Using a third party can complicate things a bit, but your example of using it with gaming is great.

    in reply to: OCU C)OST C Discussion Lesson 07 #105603
    Isabelle Tubbs
    Participant

    Virtualization contains many different aspects. Each of which have some advantages and disadvantages. Two virtualization components are storage virtualization and data virtualization.

    Storage virtualization involves taking the amount of storage on the system to be assigned to the virtual machines, which makes the storage efficiency even greater and assures that storages changes to one VM do not affect the other VMs (GeeksforGeeks, 2025; Naik, 2024). For a company or organization, taking advantage of the amount of available storage is beneficial. However, this does make management of the virtual machines more complex, and using virtualization would be costly at first (GeeksforGeeks, 2024; GeeksforGeeks, 2025). This must be taken into account before opting to use virtual machines.

    Data virtualization is taking the combined data and creating a virtual data layer that shows the data all in one place (GeeksforGeeks, 2025; Naik, 2024). Having centralized control from virtualization gives IT professionals more convenience and saves their time. However, a risk with data virtualization is that using a third party’s platform could make the data open to attacks (GeeksforGeeks, 2025; GeeksforGeeks, 2024). As a result, security measures (as with any device or group of devices) must be put in place.

    References
    GeeksforGeeks. (2024, June 11). Pros and Cons of Virtualization in Cloud Computing. http://www.geeksforgeeks.org/pros-and-cons-of-virtualization-in-cloud-computing/
    GeeksforGeeks. (2025, April 10). Virtualization in Cloud Computing and Types. http://www.geeksforgeeks.org/virtualization-cloud-computing-types/#types-of-virtualization
    Naik, R. (2024, December 11). Understanding the Types of Virtualization in Cloud Computing. Crest Infosystems. http://www.crestinfosystems.com/types-of-virtualization/

    in reply to: OCU C)OST C Discussion Lesson 06 #105590
    Isabelle Tubbs
    Participant

    Hello, James! Those are two great options for troubleshooting. Command lines are helpful tools, especially with testing network connections. Task Manager helps to essentially get real-time information with how the CPU and memory are being used. Getting information from this gives a good starting place for what actions to take next.

    in reply to: OCU C)OST C Discussion Lesson 06 #105589
    Isabelle Tubbs
    Participant

    This week, we learned about the command line tools and options for testing a network connection. If there is an issue with a network connection, using these tools to troubleshoot the problem is important. For Windows, using ipconfig can provide information about the IP settings configured on the device. If the NetBIOS information is what is required, using nbtstat would be appropriate. Also, doing a ping, tracert, or pathping would be good tests to see what a device is currently able to connect to, like the server and other devices on the network.

    If the issue is not necessarily related to a network connection, there are other troubleshooting options. The Windows Recovery Environment is a troubleshooting tool that allows the Windows device to look for and resolve any problems, particularly with startup issues. This is helpful for IT professionals because it gives them information for how to solve the issue. Another option is to boot to the Windows Pre-Installation Environment, which allows access to files and helps resolve issues as well.

    in reply to: OCU C)OST C Devotion 03 #105588
    Isabelle Tubbs
    Participant

    The centurion’s faith in this passage is amazing, because even though he was not of the Jewish community, he trusted in Jesus, in His power, and in His authority. The centurion understood how authority worked because of his own experience and believed that Jesus had the heavenly authority to heal his servant.
    The centurion was humble enough to ask Jesus for help, even though the Romans were the ones occupying the Hebrew land at the time. He was so humble that he felt he did not deserve to have Jesus come to his home.
    Also, the centurion was kind enough to want his servant to get better and be healed. It is amazing that both Jesus and the centurion cared about a servant, who was considered as a lower status during that time period.
    Later, Jesus tells him to go home because his servant is healed. When the centurion goes back, he finds out that the servant was healed at the time when Jesus told him. Jesus does have the heavenly authority, and because the centurion believed, he and his servant were blessed.

    in reply to: OCU C)OST C Devotion 02 #104714
    Isabelle Tubbs
    Participant

    Also, I just wanted to share Matthew 7:1-2 (NIV) because I think it is key to this week’s discussion as well: “‘Do not judge, or you too will be judged. For in the same way as you judge others, you will be judged, and with the measure you use, it will be measured to you.” If we want to help someone improve and grow, we must correct them with God’s love in our hearts because we would want people to lovingly correct us as well.

    in reply to: OCU C)OST C Discussion Lesson 05 #104712
    Isabelle Tubbs
    Participant

    Hello, Carlos! Nice work on your explanation of AES, RSA, and ECC. Elliptic Curve Cryptography was a type of encryption I did not encounter before this discussion, so it was interesting to learn about it from your post. It makes sense for smaller devices to have a specific type of encryption for data, especially with the widespread use of mobile devices today.

    in reply to: OCU C)OST C Discussion Lesson 05 #104711
    Isabelle Tubbs
    Participant

    Encryptions are vital for securing data because they scramble that data using an encryption algorithm, which often involves the use of a pre-shared key (PSK) to secure, unlock, and unscramble the information. Three types of encryptions include RSA, 3DES, and AES. RSA (Rivest-Shamir-Adleman) encryption uses cryptography algorithms with two keys and are great to use with VPNs and services with email and communication (Human, 2023). Its purpose is based more on the type of information that needs to be secured rather than the type of organization. 3DES (Triple Data Encryption Standard) encryption, which can use two keys or three keys, uses a process of encrypting, decrypting, and encrypting again; it is often used for financial companies (Human, 2023). Finally, AES (Advanced Encryption Standard) encryption uses a block cipher that is symmetric and should mainly be used for classified data, like data from large organizations or the government (Human, 2023).

    References
    Human, H. (2023, February 2). Types of Encryption [Explanations, Examples, Significance] https://review42.com/resources/types-of-encryption/

    in reply to: OCU C)OST C Discussion Lesson 04 #104705
    Isabelle Tubbs
    Participant

    Hello, James! This is a great, concise explanation of how TCP and IP work together as TCP/IP. I also found it quite interesting to learn the differences between the two. Thanks for sharing the reference you used; it does tie in with what we have learned, like UDP, FTP, POP, etc. UDP is an alternative to TCP/IP, but it is not as reliable. Is there a situation that you think would warrant using UDP over TCP/IP?

Viewing 15 posts - 121 through 135 (of 144 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.