Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Joseph Doss

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 21 total)
  • Author
    Posts
  • in reply to: OCU C)ISSO C Devotion 05 #106693
    Joseph Doss
    Participant

    This makes me think of not evil spirits , but our everyday struggles. Like the evil spirits within Legion, they are many but running to Jesus, he can remove them all.

    in reply to: OCU C)ISSO C Discussion Lesson 18 #106639
    Joseph Doss
    Participant

    Several ways fires could be prevented or stopped would be to build the server room with fireproof materials for the walls/flooring to avoid fire spreading from other parts of the building, if one started this would also prevent fires from starting inside the room. Proper wire management and upkeep of equipment could also lessen the odds of a fire starting. Dry water lines could provide fire suppression without the chance of water leaking onto equipment and C type fire extinguishers should be kept in the room as they are used for electrical fires.

    in reply to: OCU C)ISSO C Discussion Lesson 17 #106638
    Joseph Doss
    Participant

    Think of the movie The Matrix, in essence it’s about group of hackers that are attempting to take down a global power facility, their motive is that they find that this facility is very unethical in they way they treat their employees so they are attempting to entirely close the facility using their hacking skills.

    The means is that they find a weakness in this facilities cybersecurity setup in the form of a glitch which they exploit in order to gain more access and take more and more control of the computer systems.

    This attack could have been prevented or stopped by simply patching this glitched application, proper system testing may have also aided in a stronger security setup. In not patching this glitch the facility provided theses hackers the opportunity to breach their systems.

    in reply to: OCU C)ISSO C Discussion Lesson 16 #106591
    Joseph Doss
    Participant

    One way, and perhaps the most important is to have a plan, what do we do if X occurs and how do we go about doing that? We need to be ready for fires, ask where do we go, where do we send our data or other assets. Put in place fire suppression systems and evacuation routes. What about natural disasters, major storms, floods, earthquakes (is applicable) we could have offsite data centers with emergency backups, cold/warm/hot sites to pick up if needed. It is also possible to offload some efforts unto a third party using cloud services.

    in reply to: OCU C)ISSO C Devotion 04 #106553
    Joseph Doss
    Participant

    Storms of life tend to come and go in our lives and like the weather, some are small some are large, some storms are quick and some last a long while. But it is important to seek shelter in God to protect us in our storms of life, as we would seek shelter in our homes to avoid the rains and the winds.

    in reply to: OCU C)ISSO C Discussion Lesson 13 #106548
    Joseph Doss
    Participant

    The SDLC is important as it is a process that ensures a software is properly planned, tested, created, rolled out, and has continued updates for found exploits and flaws. this ensures that a application can stay secure over its lifetime.

    in reply to: OCU C)ISSO C Discussion Lesson 14 #106547
    Joseph Doss
    Participant

    Some database security issues can simply be misconfigurations, an open port that could allow attackers access, poor admin passwords, or incomplete/lazy programming that could lead to an SQL injection, as demonstrated in this video https://www.youtube.com/watch?v=2OPVViV-GQk

    in reply to: OCU C)ISSO C Discussion Lesson 15 #106546
    Joseph Doss
    Participant

    One attack mentioned in this weeks video was a “side channel attack” there is one known as the TEMPEST attack, in this type of attack special equipment is used to capture the RF signals emitted from an electric device, such as a computer monitor. Attackers are then able to reconstruct the output of the monitor. Such methods can be used to capture data before it is encrypted. an SO could implement RF blocking material to prevent stray RF signals from being captured or read

    in reply to: OCU C)ISSO C Devotion 03 #106493
    Joseph Doss
    Participant

    I can very much see division now days, a good example would be the modern political sphere. We become more and more polarized everyone fighting for their “team” and disregarding the impact on those around them. But, this seems to happen in everything church, family, social media groups and so on as if we all have forgotten that we are made in the image of God, we do not see each other as human but obstacles.

    in reply to: OCU C)ISSO C Discussion Lesson 11 #106485
    Joseph Doss
    Participant

    One type of attack is DNS spoofing, this is where DNS server or a DNS cache is compromised in a way that re directs internet traffic from a website to another, typically a look alike, someone may enter login information, which the attacker then receives.There is also a man in the middle attack, in this security issue internet in routed through an attackers machine before sending the users traffic to the site of resources they intended to access, the attacker then eavesdrops on the traveling data, which is why connecting to a VPN while using public wifi is impossible. A third security issue to keep in mind would be phishing, where face emails are sent out to a specific target or on mass to random people asking for information while appearing to be a trusted source in order to get targets to click links, send information ect. So it is important to be able to tell where the message came from.

    in reply to: OCU C)ISSO C Discussion Lesson 09 #106480
    Joseph Doss
    Participant

    I’m going with tree typology and mesh typology. Mesh would likely be the best option as it has load balancing and avoids a single point of failure. Speaking uptime, which is critical for most businesses, A network security officer would not have to worry as much about taking a system down for updates and or maintenance because lack of single points of failure. Tree typology while a failure point would not bring down the entire network it could bring down a large portion depending on the “branch”

    in reply to: OCU C)ISSO C Devotion 02 #106298
    Joseph Doss
    Participant

    Funny enough this was the topic of this weeks sermon at my church. At times I do feel or find myself to be spiritually suck, it seems easy to get caught up in sins with all the temptations and distractions of the modern day. It’s important to stick with not only God but Christian friends and company that can support you in your spiritual walk.

    in reply to: OCU C)ISSO C Discussion Lesson 07 #106250
    Joseph Doss
    Participant

    Symmetric ciphers use a single encryption key to both encrypt and decrypt data. Think of a lock to your house, the items inside of your home being the “data”. outside looking in the items or “data” cannot be viewed but once inside you can see the items (data) The encryption key being the key to your door if you use you key to unlock your door or “decrypt” the data you can see what is inside. The door to the home can only be locked and unlocked by the same key, just as your data is encrypted and decrypted by the same single key.

    An example of an encryption method would be the Data Encryption Standard, this encryption method in a way scrambles or encodes your data (the house and lock) and a key to un-encoding that data is created (your door key) anyone with that key can open the door, but without the key the door stays locked (your data stays secure)

    in reply to: OCU C)ISSO C Discussion Lesson 06 #106249
    Joseph Doss
    Participant

    Do you like information technology? Have you an interest in cybersecurity? We are seeking a self-motivated Security Manager to join our team!

    Do you have experience with keeping and managing logs, records management, or patch management?

    As a Security Manager you will be responsible for preventing and responding to security incidents, ensuring employees have proper access levels of information, guiding in control processes and ensuring patches are installed properly and on a timely manner.

    we look forward to meeting you! If interested contact us at (123)45678 or via email (email@email)

    in reply to: OCU C)ISSO C Discussion Lesson 03 #106182
    Joseph Doss
    Participant

    Identity management, authorization techniques, SSO, and access control monitoring are all forms or methods of protecting data from unauthorized or underprivileged users. Authorization techniques may include Something you know, something you are, something you have such as things like passwords or passphrase possibly keys or fingerprint scanners, which can lockdown data on a device or locations like server rooms.

    SSO is a method of a single time sign on, an example may be social media like facebook, which only requires you to authenticate yourself a single time (unless logged out)

    Access control monitoring is a method of keeping track of a users access history.

Viewing 15 posts - 1 through 15 (of 21 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.