Isabelle Tubbs
Forum Replies Created
-
AuthorPosts
-
Isabelle Tubbs
ParticipantBusinesses today need physical security hardware devices to maintain security and safety of data and information. Three tools include intrusion detection systems, firewalls, and multi-factor authentication.
An intrusion detection system (IDS) examines the traffic on the network and then sends out an alert if it finds any malicious activity or unauthorized access (GeeksforGeeks, 2025). This is an important system to install for businesses who need to know when any attacks or unauthorized accesses happen on the system. Likewise, having a physical detection system, like surveillance cameras and sensors, is beneficial for business locations (Avigilon, n.d.).
However, to prevent attacks in the first place, firewalls are important tools for controlling the incoming and outgoing traffic. They are used to deny access to malicious users or software while also allowing known objects in. Although an intrusion detection system is helpful for alerting businesses of attacks, it is also good to have systems in place that prevent such things.
Another method for security is the way authorized users are authenticated for access. Previously in this course, we learned how multi-factor authentication can be more secure for authenticating users. It can use information (like a password), or an object (like access to an email), etc. Using more than one method can help businesses be more secure because it requires more than just a password to get in to access important information. This can apply to logging in online or even for accessing a secure building (Avigilon, n.d.).
References
Avigilon. (n.d.). What is physical security? Controls, methods, and measures for commercial buildings. Retrieved May 2, 2025 from https://www.avigilon.com/blog/physical-security-guide#key-physical-security-measures
GeeksforGeeks. (2025, April 28). Intrusion Detection System (IDS). https://www.geeksforgeeks.org/intrusion-detection-system-ids/Isabelle Tubbs
ParticipantHello, Caleb! Great evaluation of some physical tools for the protection of businesses. I agree that studying this is an important aspect of security. Camera systems are a good way to send alerts of intruders and to also keep evidence of it. Key cards do have a disadvantage that they sometimes need to be fixed more often than traditional keys, but since they are not easy to copy, they do add more security.
Isabelle Tubbs
ParticipantGreat evaluation of network vulnerabilities and possible solutions or controls. What I found particularly interesting was that you brought up using a different network, specifically using them on insecure public network connections. This shows the importance of educating users about their technology and network connections. Public networks may seem more convenient, but they are not the safest. Like you mentioned, encryption and VPN connections are good actions to take.
Isabelle Tubbs
ParticipantJesus’s authority shows that He is both fully man and fully God. He has the authority to forgive sin, and one example of this is found in this week’s passage. The Pharisees condemned Jesus for saying He could forgive sins because only God can forgive sin. However, this was exactly the point. Jesus dwelled on the earth to be a perfect example for us and to be a perfect sacrifice so we could be forgiven. At the same time, He is the Son of God. His power is amazing and cannot be fully fathomed.
Others may present other religions, but the Lord has shown that He is the One with true power. He is the one true God, the King of kings, and the Lord of lords.
What is great in this week’s passage is that Jesus not only forgives the man, but He also heals him too. He sets him free spiritually from sin and physically from a disability. Jesus came to bring us true freedom.Isabelle Tubbs
ParticipantHello, Carlos! Yes, if a hacker or a malicious software gains any type of access to a system, this is a huge threat. However, like you mentioned, keeping things up to date and implementing strong policies and protocols can reduce the level of risk. I also would like to add that educating users on safe online practices could prevent unintentional installation of malware.
Isabelle Tubbs
ParticipantNetworks connect a user and their device, which contain a lot of sensitive data about the user and organization. As a result, vulnerabilities like insecure technologies and user behavior, as well as attack threats like malware, should be prevented.
Malware can come in many different forms, but it is essentially a way to spread malicious software throughout a system, which could spread to other systems as well. One way to prevent the installation of malware is to have antimalware installed so that it can detect suspicious files before installation and notify the user.
Insecure technologies could occur from older equipment and protocols. For example, using an older version of Windows could make it susceptible to forced access attacks from a rainbow table. If a more modern version of Windows was installed, it would make it more difficult for attacks to be successful. Also, updating the hardware on a device would make it stronger as well.
The behavior of users can leave a device vulnerable if they are not educated in preventing attacks and using safe techniques while online. Teaching users how to use their devices safely would prevent threats from users such as installing malware. Additionally, restricting user controls would prevent some users from being able to install malware in the first place.
Isabelle Tubbs
ParticipantHello, Cameron! I also wrote about Storage Virtualization, and it is true that it took some time to find a con to using it. However, if a business is not willing to pay the initial cost of virtualization, then they need to decide whether or not to use it ahead of time. Although I think this would really not be an issue with large companies. Also, nice work with Desktop Virtualization. Using a third party can complicate things a bit, but your example of using it with gaming is great.
Isabelle Tubbs
ParticipantVirtualization contains many different aspects. Each of which have some advantages and disadvantages. Two virtualization components are storage virtualization and data virtualization.
Storage virtualization involves taking the amount of storage on the system to be assigned to the virtual machines, which makes the storage efficiency even greater and assures that storages changes to one VM do not affect the other VMs (GeeksforGeeks, 2025; Naik, 2024). For a company or organization, taking advantage of the amount of available storage is beneficial. However, this does make management of the virtual machines more complex, and using virtualization would be costly at first (GeeksforGeeks, 2024; GeeksforGeeks, 2025). This must be taken into account before opting to use virtual machines.
Data virtualization is taking the combined data and creating a virtual data layer that shows the data all in one place (GeeksforGeeks, 2025; Naik, 2024). Having centralized control from virtualization gives IT professionals more convenience and saves their time. However, a risk with data virtualization is that using a third party’s platform could make the data open to attacks (GeeksforGeeks, 2025; GeeksforGeeks, 2024). As a result, security measures (as with any device or group of devices) must be put in place.
References
GeeksforGeeks. (2024, June 11). Pros and Cons of Virtualization in Cloud Computing. http://www.geeksforgeeks.org/pros-and-cons-of-virtualization-in-cloud-computing/
GeeksforGeeks. (2025, April 10). Virtualization in Cloud Computing and Types. http://www.geeksforgeeks.org/virtualization-cloud-computing-types/#types-of-virtualization
Naik, R. (2024, December 11). Understanding the Types of Virtualization in Cloud Computing. Crest Infosystems. http://www.crestinfosystems.com/types-of-virtualization/Isabelle Tubbs
ParticipantHello, James! Those are two great options for troubleshooting. Command lines are helpful tools, especially with testing network connections. Task Manager helps to essentially get real-time information with how the CPU and memory are being used. Getting information from this gives a good starting place for what actions to take next.
Isabelle Tubbs
ParticipantThis week, we learned about the command line tools and options for testing a network connection. If there is an issue with a network connection, using these tools to troubleshoot the problem is important. For Windows, using ipconfig can provide information about the IP settings configured on the device. If the NetBIOS information is what is required, using nbtstat would be appropriate. Also, doing a ping, tracert, or pathping would be good tests to see what a device is currently able to connect to, like the server and other devices on the network.
If the issue is not necessarily related to a network connection, there are other troubleshooting options. The Windows Recovery Environment is a troubleshooting tool that allows the Windows device to look for and resolve any problems, particularly with startup issues. This is helpful for IT professionals because it gives them information for how to solve the issue. Another option is to boot to the Windows Pre-Installation Environment, which allows access to files and helps resolve issues as well.
Isabelle Tubbs
ParticipantThe centurion’s faith in this passage is amazing, because even though he was not of the Jewish community, he trusted in Jesus, in His power, and in His authority. The centurion understood how authority worked because of his own experience and believed that Jesus had the heavenly authority to heal his servant.
The centurion was humble enough to ask Jesus for help, even though the Romans were the ones occupying the Hebrew land at the time. He was so humble that he felt he did not deserve to have Jesus come to his home.
Also, the centurion was kind enough to want his servant to get better and be healed. It is amazing that both Jesus and the centurion cared about a servant, who was considered as a lower status during that time period.
Later, Jesus tells him to go home because his servant is healed. When the centurion goes back, he finds out that the servant was healed at the time when Jesus told him. Jesus does have the heavenly authority, and because the centurion believed, he and his servant were blessed.Isabelle Tubbs
ParticipantAlso, I just wanted to share Matthew 7:1-2 (NIV) because I think it is key to this week’s discussion as well: “‘Do not judge, or you too will be judged. For in the same way as you judge others, you will be judged, and with the measure you use, it will be measured to you.” If we want to help someone improve and grow, we must correct them with God’s love in our hearts because we would want people to lovingly correct us as well.
Isabelle Tubbs
ParticipantHello, Carlos! Nice work on your explanation of AES, RSA, and ECC. Elliptic Curve Cryptography was a type of encryption I did not encounter before this discussion, so it was interesting to learn about it from your post. It makes sense for smaller devices to have a specific type of encryption for data, especially with the widespread use of mobile devices today.
Isabelle Tubbs
ParticipantEncryptions are vital for securing data because they scramble that data using an encryption algorithm, which often involves the use of a pre-shared key (PSK) to secure, unlock, and unscramble the information. Three types of encryptions include RSA, 3DES, and AES. RSA (Rivest-Shamir-Adleman) encryption uses cryptography algorithms with two keys and are great to use with VPNs and services with email and communication (Human, 2023). Its purpose is based more on the type of information that needs to be secured rather than the type of organization. 3DES (Triple Data Encryption Standard) encryption, which can use two keys or three keys, uses a process of encrypting, decrypting, and encrypting again; it is often used for financial companies (Human, 2023). Finally, AES (Advanced Encryption Standard) encryption uses a block cipher that is symmetric and should mainly be used for classified data, like data from large organizations or the government (Human, 2023).
References
Human, H. (2023, February 2). Types of Encryption [Explanations, Examples, Significance] https://review42.com/resources/types-of-encryption/Isabelle Tubbs
ParticipantHello, James! This is a great, concise explanation of how TCP and IP work together as TCP/IP. I also found it quite interesting to learn the differences between the two. Thanks for sharing the reference you used; it does tie in with what we have learned, like UDP, FTP, POP, etc. UDP is an alternative to TCP/IP, but it is not as reliable. Is there a situation that you think would warrant using UDP over TCP/IP?
-
AuthorPosts