Joseph Doss
Forum Replies Created
-
AuthorPosts
-
Joseph DossParticipant
It is very different at times to see my God-given purpose, but I do know Him. Sometimes I think I’m on the correct path but honestly don’t know, I can only pray for guidance and look to find it.
Joseph DossParticipantNeed to know policy in order to keep important data from those who do not need access to it. May help in setting up VLANs
A mobile device policy should be in place (provided the company intends on using mobile devices) would need to know if VPNs are being used or not, a remote access policy would also tie in to this.
Technical standards policy in order to ensure that all devices can easily communicate and to provide a more standardized environment so less training would be needed.
Joseph DossParticipantI don’t think there are any “good people” in the world. From mankind’s perspective, there are good and bad people but we are all sinners. But thanks be to God that Jesus paid for all the sins of all who believe in His name and accept Him as lord and savior.
Joseph DossParticipantThe most basic would be to use a firewall which would block unwanted traffic from entering the network and gaining access to certain servers/computers/devices.
The use of a DMZ for web services to separate internal private servers from those accessible online to the public such as webpages, lessens the chance of an attacker gaining access to private Information by attacking public servers.
Joseph DossParticipantA router acts as a bridge between two or more networks such as a WAN like the Internet and a LAN such as an office or home network. A switch essentially allows you to take a single network port from a device and divide it into multiple ports allowing you to connect many more devices into a network. There are managed and unmanaged or “dumb” switches managed switches can perform some routing support such as VLANS and can be managed remotely over the network whereas unmanaged switches have no such features.
Joseph DossParticipantSSH (Secure Shell) – enables remote administration of a (enabled) computer or device over a network connection, SSH runs on port 22 and is encrypted. SSH is a more secure replacement of Telent, allows the same administration of devices but is not encrypted.
HTTPS (HyperText Transfer Protocol Secure)- Is an encrypted version of HTTP (HyperText Transfer Protocol) both are used to send data over the internet such as webpages. HTTPS runs of port 443, While HTTP runs on port 80.
SMB (Server Message Block) – Is a protocol used to share files on a local network, it runs on port 445 and port 139
Joseph DossParticipantJesus is many things but mainly I would say that Jesus is my Lord and Savior who rose from the dead after talking my sins to the cross and that He is the son of the one and only God.
Joseph DossParticipantThree devices include, routers, switches and modems. Routers are used both in home and business environments they have many functions but their primary function is to route data and is typically the center of a home network many home routers include functions such as firewalls and DHCP some higher end models support VLANS. A switch is a device that allows multiple devices to connect to the same router/switch/computer port by sorting out data and sending to a specific connected device. A modem is the device that connects a local network to the ISPs many of which also serve as routers in a home or small business network.
Joseph DossParticipantWhen troubleshooting always start with the simplest checks first (ex. if you have network connection issues is your router on) Check if the device or devices are properly connected to power and powered on. If so check you other connections (if network issue check your Ethernet cable or WiFi, if it’s a video issue check your monitor connection and so on) depending on your case and escalate upward into more advanced testing until you find the issue, of course tanking into account what COULD be the issue (If you keyboard isn’t working don’t check your mouse for issues) anything that could not be the issue can be automatically ruled out before continuing further.
Joseph DossParticipantCompanies need to create data security policies in order to make data/computer usage rules enforceable. Some simple policies can include things like need to know not sharing information/passwords or user account with information not intended to receive it or not using personally owned USB devices including phone chargers in company computer systems. Other policies can include not allowing employees to use company computers for personal reasons or restricting who can bring what into specific building locations (not allowing individuals to bring cellphones or cameras into areas with secure data or information)
Joseph DossParticipantCryptography is a very important part of data security, it enables us to keep data secure by encrypting it into an unreadable state keeping it safe from those who do not hold the key/password. A way that it can be used would be to encrypt a external drive, if the drive is stolen, the data remains safe due to its encryption.
Joseph DossParticipantWe all need to realize that we are sinners, none of us are righteous, we cannot have rightness apart from God. So we must remain humble and look to the only truly righteous person. Jesus, He alone is righteous and we must faithfully rely on Him to make us righteous as well.
Joseph DossParticipantCompanies first need to consider the design of their networks and the level of security needed for what device(s). Once that is determined they can use technologies such as firewalls, IDS/IPS’s, VPN’s etc. as needed based on their determinations and place them on the network as needed. They should enable features and settings on the devices as needed as well in order to balance security and cost.
Joseph DossParticipantSeparation of duties is one of OWASP security principles. It limits how much involvement project or in a business by separating important stages. This helps to prevent fraud by keeping others accountable and in check in regards to a process.
Joseph DossParticipantI do follow Jesus and see Him as my personal Savior but, I do not often declare His name and I also feel that I do not follow close enough at times. I need to work out my relationship whit Him more often in order to become a more faithful believer
-
AuthorPosts