Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Jessica Belknap

Forum Replies Created

Viewing 15 posts - 16 through 30 (of 36 total)
  • Author
    Posts
  • in reply to: OCU C)OST B Discussion Lesson 09 #98245
    Jessica Belknap
    Participant

    Erin,

    I appreciate your suggestion regarding the implementation of security lighting that can promptly notify the guards in the event of an intruder.

    in reply to: OCU C)OST B Discussion Lesson 09 #98244
    Jessica Belknap
    Participant

    Physical security hardware encompasses three primary types of devices. The first type consists of locks and keys, where a key serves as a security token providing access to a secured area. The second type involves physical barriers such as fences, gates, or walls, which are installed to establish a secure perimeter and deter potential intruders. The third type encompasses video surveillance, which includes the use of closed-circuit television (CCTV) cameras and video recording equipment. These devices are utilized to monitor physical spaces in real time and also for post-incident review, providing an additional layer of security and surveillance.

    in reply to: OCU C)OST B Discussion Lesson 08 #98243
    Jessica Belknap
    Participant

    Addison,

    Phishing is a type of cybercrime where individuals impersonate trusted entities, such as banks or online services, to deceive people into revealing sensitive information, such as usernames, passwords, and financial details. This is typically done through deceptive messages, often via email or text, containing links to fake websites that closely resemble legitimate ones. These fraudulent websites are designed to trick individuals into entering their personal information, which is then used for malicious purposes such as stealing money or committing identity theft. It’s important to be cautious and verify the authenticity of any requests for personal information, especially when they come from unexpected or unfamiliar sources.

    in reply to: OCU C)OST B Discussion Lesson 08 #98242
    Jessica Belknap
    Participant

    The common types of network vulnerabilities include outdated software, which can be exploited due to unpatched security flaws, Working outside of the company network, which can expose sensitive data to unauthorized access, and stolen passwords and usernames, which can be used for unauthorized access to the network or sensitive information.

    There are several methods to safeguard network infrastructure. One effective approach is encryption, which involves encoding data to render it indecipherable to anyone monitoring it. Encryption is the cornerstone for ensuring authentication, confidentiality, and integrity within a network. Another crucial method is the use of a firewall, which acts to isolate a network and shield it from unwanted traffic. Firewalls can be integrated into devices such as routers and switches, or they can be separately implemented for added protection. Additionally, network segmentation plays a vital role in network security by isolating specific components to prevent unauthorized access and potential infections from spreading to other parts of the network, particularly IoT devices.

    https://purplesec.us/learn/common-network-vulnerabilities/

    in reply to: OCU C)OST B Discussion Lesson 07 #98174
    Jessica Belknap
    Participant

    Addison,

    I eagerly anticipate your posts, and your insightful perspective on the topic offers valuable information and enhances comprehension.

    in reply to: OCU C)OST B Discussion Lesson 07 #98173
    Jessica Belknap
    Participant

    Server Virtualization is a widely used virtualization technology that allows organizations to partition a physical server into multiple virtual servers, each with its own operating system and applications. This process involves the use of a hypervisor, which is a software layer that enables the creation and management of these virtual servers. By decoupling the software from the underlying hardware, Server Virtualization helps optimize server resources, improve scalability, and streamline management. This technology provides organizations with greater flexibility, cost savings, and efficient utilization of computing resources. Server virtualization offers several advantages, one of which is the implementation of backup and disaster recovery (BDR) solutions. BDR involves the process of creating redundant copies of data to ensure that in the event of data loss, the information can be efficiently restored. This practice is crucial for maintaining data integrity and ensuring business continuity. One of the drawbacks of server virtualization is that although a virtual server infrastructure requires fewer physical machines, it necessitates more powerful and expensive hardware servers that can host multiple virtual servers. This means that while there are cost savings from reduced physical infrastructure, there is a trade-off in the form of higher hardware investment for the servers that support the virtual environment.

    Desktop virtualization is a type of virtualization that allows users to access their complete desktop environment from any device with an internet connection. This technology enables individuals to use their familiar desktop interface, applications, and files from a remote location, eliminating the need to be tied to a specific physical device. By leveraging desktop virtualization, users can enjoy the flexibility of working from different devices while maintaining a consistent computing experience. Desktop virtualization offers the benefit of allowing multiple users to share endpoints seamlessly, as each user is allocated their own virtual desktop uniquely linked to their individual login credentials. This setup ensures privacy and security for each user. Additionally, desktop virtualization enables a wide range of devices to run any operating system, providing flexibility and accessibility. This feature makes it particularly advantageous for organizations that adopt a Bring Your Own Device (BYOD) policy, as it accommodates the diverse devices and operating systems used by employees.

    in reply to: OCU C)OST B Discussion Lesson 06 #98164
    Jessica Belknap
    Participant

    Trae,

    I fully agree with Addison’s viewpoint. Your post on step-by-step troubleshooting is quite intriguing and unique. The approach you have outlined for troubleshooting Windows is something I had never considered before. I am looking forward to implementing the troubleshooting techniques you have discussed in your post the next time I encounter computer issues. Thank you for providing such valuable information.

    in reply to: OCU C)OST B Discussion Lesson 06 #98158
    Jessica Belknap
    Participant

    When it comes to troubleshooting, several standard methods are commonly used. These methods include diagnosis or failure analysis, which involves identifying and understanding the root cause of the issue; elimination, which is the systematic process of ruling out potential causes; and product restoration, which involves restoring the product or system to its original working condition.

    The troubleshooting process generally consists of five essential steps. First, it’s crucial to identify the problem accurately. This involves clearly defining what the issue is and understanding its impact. Then, relevant information needs to be collected. This information can include error messages, system logs, or any other data that can provide insight into the problem.

    Next, the collected data is carefully analyzed to understand the underlying causes of the problem. Once the analysis is complete, potential solutions are proposed and tested to see if they resolve the issue. Finally, once a solution has been found, it is implemented to fix the problem and restore the product or system to full functionality.

    Computerworld.com/article/1612986/windows-troubleshooting-trips-tools-techniques.html

    in reply to: OCU C)OST B Discussion Lesson 05 #98078
    Jessica Belknap
    Participant

    Addison,

    I really appreciate the thorough and well-researched references you included in your study. The use of examples from “Human Henrick Encryptions” really helped to deepen our understanding of encryption keys.

    in reply to: OCU C)OST B Discussion Lesson 05 #98076
    Jessica Belknap
    Participant

    There are three encryption methods: symmetric, Asymmetric, and Hashing. Symmetric encryption, also known as secret key Encryption, is a widely used method. It operates on the principle of using a single key to encrypt and decrypt data. This key is crucial for both processes as a random string of bits by a computer. Visualize the key as a specific set of instructions to create a secret language that transforms the original data. Replace each alphabet letter with another letter based on the key, and when you’re writing a message, you use this secret language to transform each letter according to the key. Asymmetric Encryption uses two keys, one for public encryption and the other for private encryption. Hashing Encryption is a unique process of transforming any data, regardless of size, to a unique output known as a hash value.

    sealpath.com

    in reply to: OCU C)OST B Devotion 04 #98029
    Jessica Belknap
    Participant

    As a little girl, my understanding of God was shaped by my experiences at the church I attended. My family didn’t talk much about our heavenly father until I reached my 20s and met my husband, who shared his beliefs with me. It was at the age of 20 that I committed to Christianity and began to grow in my faith, learning and experiencing so much along the way.

    in reply to: OCU C)OST B Discussion Lesson 04 #98028
    Jessica Belknap
    Participant

    Erin,

    As you explain in your post, I can better understand IP addresses and the importance of keeping them secure. One of the methods of keeping my IP secure is using a VPN, which creates a secure encrypted connection to the internet, effectively masking our IP address.

    in reply to: OCU C)OST B Discussion Lesson 04 #98017
    Jessica Belknap
    Participant

    TCP stands for Transmission Control Protocol, and IP stands for Internet Protocol. Both are comprehensive rules and standards that facilitate communication between computers over networks such as the Internet. These protocols enable smooth and reliable data exchange between different devices. TCP/IP defines how data is formatted, addressed, transmitted, routed, and received, ensuring it reaches its intended destination accurately and without errors. As the predominant protocol suite used on the internet today, TCP/IP underpins the fundamental functioning of online communication and data transfer.

    in reply to: OCU C)OST B Discussion Lesson 03 #97976
    Jessica Belknap
    Participant

    Hi Trae,

    I have a question: Which would you prefer, hands-on or book learning, to better understand the operating system’s technology? Also, What methods help you learn and remember the process the fastest? And What advice would you give to someone like me who knows about 75% of the operating system?

    in reply to: OCU C)OST B Devotion 03 #97940
    Jessica Belknap
    Participant

    Psalms 37:5 Commit your way to the Lord; trust also in Him, and He shall bring it to pass.

    Life is not predictable, and There are ups and downs. When times are reasonable, it can feel more manageable. But when times are at their worst, we must trust our Lord. God’s unchanging character can give us a firm foundation when things feel unsteady.

Viewing 15 posts - 16 through 30 (of 36 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.