Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Jason Springer

Forum Replies Created

Viewing 15 posts - 16 through 30 (of 58 total)
  • Author
    Posts
  • in reply to: OCU C)SP B Week 02 Lesson 05 Discussion #99947
    Jason Springer
    Participant

    Hello Jacob,
    I agree that RAID storage is one of the best ways to protect data because of fault tolerance. RAID 5 is usually a great option because it uses parity but I also like RAID 10 because it combines the mirroring of RAID 1 with the striping of RAID 0.

    in reply to: OCU C)SP B Week 02 Lesson 04 Discussion #99944
    Jason Springer
    Participant

    Hello Latoya,
    After reading your discussion post I thought it was well researched and thought through. I liked how you brought up the NIST or National Institutes of Standards and Technology as a way to prevent authentication or identification vulnerabilities. NIST is still very new to me so I’m glad I was able to learn more about it through your discussion post.

    in reply to: OCU C)SP B Week 02 Lesson 05 Discussion #99901
    Jason Springer
    Participant

    One type of control a company could implement to help secure its network is TPM. TPM is a trusted platform module used to encrypt servers’ hard drives and memory. By using TPM companies will secure their networks by encrypting their data in a way that’s only readable to the person or people with the correct key to the encryption. This means that if someone happens to steal the physical drive from the company they won’t be able to use the information unless they manage to find the right key. TPM also proves the integrity of the system or computer by checking the IP or MAC address to ensure that the computer is supposed to have those encryption data collections. According to Intel, “A TPM, or a trusted platform module, is a physical or embedded security technology (microcontroller) that resides on a computer’s motherboard or in its processor. TPMs use cryptography to help securely store essential and critical information on PCs to enable platform authentication.”

    (n.d.). What Is a Trusted Platform Module? Intel. Retrieved November 24, 2024, from https://www.intel.com/content/www/us/en/business/enterprise-computers/resources/trusted-platform-module.html#:~:text=A%20TPM%2C%20or%20a%20trusted,PCs%20to%20enable%20platform%20authentication.

    in reply to: OCU C)SP B Week 02 Lesson 04 Discussion #99900
    Jason Springer
    Participant

    One of the top ten OWASP security principles is broken authentication. Broken authentication is crucial to control because attackers can detect it manually and exploit it using brute force and dictionary attacks. If an attacker finds the weaknesses in this broken authentication then they can take control over an admin or multiple other accounts which then allow them to infiltrate the network or system. To prevent this type of attack from happening companies are starting to require two-factor authentication which requires the user to use something they know, have, or are to access the account. This method of authentication is becoming more and more popular because even though people are warned about these attackers many still use simple passwords that the hackers can easily figure out and gain access to that person’s account and possibly more. By implementing two-factor authentication people are forced to use something physical whether biometric or some type of ID card or physical token.

    in reply to: OCU C)SP B Week 02 Devotion #99899
    Jason Springer
    Participant

    I do believe that these prophecies are true and undeniable evidence of Jesus. I also believe that God intentionally made these prophecies to encourage us in our faith knowing that He told the world way before Jesus came to this earth.

    in reply to: OCU C)SP B Week 01 Lesson 03 Discussion #99557
    Jason Springer
    Participant

    Hello Jacob,
    You did a great job explaining some of the risks and vulnerabilities that mobile device users faced in 2022. I also think being able to recognize these malicious attacks either through spam or malware is something people need to be educated on nowadays because social engineering is becoming more and more of a problem for older people such as grandparents who might not understand that it’s a scammer.

    in reply to: OCU C)SP B Week 01 Lesson 03 Discussion #99556
    Jason Springer
    Participant

    In 2022, mobile devices pose several risks to users, primarily related to security, privacy, and mental health. Mobile devices are vulnerable to malware, phishing attacks, and data breaches. Malicious apps, insecure Wi-Fi networks, and unpatched software can compromise sensitive information, such as banking details and personal data. Many apps track user behavior, often without explicit consent, leading to potential data misuse. Geolocation tracking, excessive permissions, and the collection of personal data can infringe on privacy rights. Excessive screen time and constant notifications can contribute to anxiety, depression, and poor sleep. Social media apps, in particular, are linked to negative body image issues and the fear of missing out (FOMO). The addictive nature of mobile apps, especially games and social media, can lead to a decrease in real-life interactions and hinder productivity. Mitigating these risks requires user awareness, secure practices, and mindful device usage.

    in reply to: OCU C)SP B Week 01 Lesson 02 Discussion #99555
    Jason Springer
    Participant

    Hello Amy,
    You did a great job explaining how companies can be vulnerable to phishing and other malware attacks. I also liked how you brought up how companies can minimize the risk of malware attacks by using firewalls which can detect more important things that sometimes people overlook on their own.

    in reply to: OCU C)SP B Week 01 Lesson 02 Discussion #99554
    Jason Springer
    Participant

    Some of the risks and vulnerabilities that companies face today in regard to networking include updated malware attacks that could attack weaker areas in the company and the possibility of extreme weather such as hurricanes in Florida or wildfires in California. These extreme weather examples aren’t going to happen every day in certain areas but they are more common and should be addressed when planning to expand or construct buildings in these areas. Malware attacks on the other hand are constantly evolving as technology grows and people become more and more knowledgeable about how different technologies function. One way that these attacks get through is by another vulnerability where an employee or owner has a lack of ways to detect fraud which allows hackers to get into the network. A policy that could be mitigated to reduce network compromise is changing passwords on the devices every six weeks or months to prevent password reuse on the network.

    in reply to: OCU C)SP B Week 01 Lesson 01 Discussion #99552
    Jason Springer
    Participant

    Hello Braden,
    You did a great job explaining why companies should perform risk assessments and incident response plans to keep their security policies up-to-date. I also agree that data encryption is another critical part of security policies that should be implemented to minimize data breaches or loss. I also agreed with you when you said, “Keeping software and systems up to date with the latest security patches is vital for patch management.”

    in reply to: OCU C)SP B Week 01 Lesson 01 Discussion #99551
    Jason Springer
    Participant

    One of the critical policies that are needed to ensure a strong security program is a password policy which requires the renewal of passwords after a certain period of time or two-factor authentication for all employees or users. This helps to prevent hackers from stealing important data from the user or employee by not allowing them to keep the same exact password for everything. Another policy that’s critical to strong security is a data backup policy that sets up mandatory data backups to be renewed and stored in another safe location to try and prevent data loss. This data loss can either come from natural causes such as weather or hardware failure or from breaches in the system that try to wipe all the data from a server. These policies should also have a planned interval for reviewing policies, opportunities for improvement, legal consideration, and an owner. The reason these are important is that policies should have some room to grow while still being legal and clear.

    in reply to: OCU C)SP B Week 01 Devotion #99503
    Jason Springer
    Participant

    One of the questions from the bible that has challenged me is when Jesus asks the disciples, “Who do you say that I am?” This is a question that I’m convinced that everyone will have to answer at some point in their life and their response will determine where they spend eternity. If someone were to ask me who I say Jesus is I would tell them that He is my Lord and Savior of my life because He’s the Son of God that loved me enough to come and pay for my sins or disobedience to God by dying in my place the death that I deserve. But after he died he rose again 3 days later proving that He had completed the payment and has overcome death.

    in reply to: OCU C)HT B Discussion Lesson 13 #99334
    Jason Springer
    Participant

    The procedure that I think is the most important for operating in the IT field is professionalism because the customer is more comfortable letting someone who displays understanding and experience in the field over someone randomly selected especially on more sensitive equipment. Most companies also won’t keep you as an employee if you don’t display good professionalism while working.

    in reply to: OCU C)HT B Discussion Lesson 12 #99333
    Jason Springer
    Participant

    Hello Braden,
    After reading your discussion post, I thought you explained the different types of Wi-Fi standards and how they’ve evolved with encryption. I also liked how you pointed out that “each standard and encryption method caters to different needs” because not every Wi-Fi range and encryption are made to work together or in specific environments.

    in reply to: OCU C)HT B Discussion Lesson 13 #99331
    Jason Springer
    Participant

    The four main operational procedures that were discussed in the chapter are environment, safety, content and privacy, and professionalism. The environment is an important factor in operational equipment running effectively because if the temperature of the room is off then parts of the system could shut down or if there’s not proper ventilation the system could also overheat. Safety is also one of the most crucial procedures for operating because it helps people understand if something is hazardous or harmful and how to respond properly to the situation. Professionalism is also a big factor nowadays that contributes to the success of companies because when employees are kind and show that they truly understand how to do their job customers notice and are more likely to come back in the future. Customer service is very important for the business operating success because companies are founded on how loyal their customers are.

Viewing 15 posts - 16 through 30 (of 58 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .