Mile2 Cybersecurity Certifications

jmontgomery2

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 24 total)
  • Author
    Posts
  • in reply to: OCU C)NP A Week 05 Devotion #91305
    jmontgomery2
    Participant

    God has blessed me in many ways and gifted me with abilities that I owe only to Him. It is up to me to hone these crafts and to offer my best to God for His glory and to spread the message of His love to humanity. This applies to all the children of God, you are special in your own way, according to God’s design and you owe Him everything. He loves us enough to die for us and forgive us of our most degenerate sins. The least we can do is to bear the image we were created in.

    in reply to: OCU C)NP A Week 05 Lesson 10 Discussion #91304
    jmontgomery2
    Participant

    These are all very good points for network planning. Especially the changing of passwords to prevent information theft. Availability is important for any business trying to offer services online in a reasonable manner, not everyone has the patience for 90’s era internet. A high performance device is the best choice to make when planning for a network for a business as you can stay competitive and efficient in your work.

    in reply to: OCU C)NP A Week 05 Lesson 10 Discussion #91303
    jmontgomery2
    Participant

    When designing a network it is important to follow a logical network design plan and cross reference it with the physical network design plan in order to streamline the setup. There is nothing worse when designing a network than cable management being an after thought as this makes maintenance harder than it should be.
    A second important design aspect is defense in depth. Redundant firewalls, password changes, and separation of duties can prevent sensitive data from falling into the wrong hands.
    Lastly, when designing a network, understanding the scope of your network and its scalability will save many headaches in the future. It is important to know what kind of network it will be, the bandwidth needed and if you will use virtualization, traditional networking, or pay for a cloud service for your network. These are all important decisions to make when designing a network.

    in reply to: OCU C)NP A Week 05 Lesson 09 Discussion #91302
    jmontgomery2
    Participant

    Great points in your post, I also got the same feeling when first reading this chapter. The replacement of parts is no different than maintaining a tractor or airplane and that allows this field to feel more natural in a sense.

    in reply to: OCU C)NP A Week 05 Lesson 09 Discussion #91301
    jmontgomery2
    Participant

    One impression I got from the chapter on day to day networking was how nuanced networking could become. This is a positive trait however as the field of IT is gigantic and even the day to day job has it’s own special behind the scenes feel to it.
    A second impression from chapter 9 is the importance of contingency plans in networking. Keeping a setup safe from everything including the moisture in the building is a top priority. There is definitely a lot for me to learn before I can become a professional in this field.

    in reply to: OCU C)NP A Week 04 Devotion #90704
    jmontgomery2
    Participant

    I do not believe I am a good enough person on my own merits to enter the kingdom of Heaven. I have fallen short of God’s standards time and time again and I know cannot live a perfect life like Christ Jesus. However, I have faith in the promises that Christ made on earth that if we give ourselves over to Him and ask Him for forgiveness, the Father will not see our sin and shame. But instead will see the Son who died to cover all of our transgressions and rose again to defeat death. Works without faith are fruitless and faith without works is dead, there must be a balance between the two as no one can be a good enough person to enter heaven. In addition you cannot just skirt by as a Christian, you need to live for God and have a relationship with Him.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90701
    jmontgomery2
    Participant

    These security controls are very effective in hardening a network and I have to agree with your point on not allowing one employee to have too much access. Insider leaks are a real threat that are extremely hard to defend against. Well done with the research and a good post.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90700
    jmontgomery2
    Participant

    These examples are nice and concise. They’re very easy to understand and convey your idea excellently. You seem to be quite knowledgeable on cloud computing and virtualization.

    in reply to: OCU C)NP A Week 04 Lesson 08 Discussion #90699
    jmontgomery2
    Participant

    A virtualized environment allows users to access simulated versions of computer technology and interacts with physical computing technology using a NIC. A cloud computing environment is a pool of resources that mulitple users can access at any given time.
    Virtualized networks are laid over a companies existing infrastructure and is provided by the company themselves. A cloud computing environment is completely off site and is provided by the company that runs the cloud computing service.
    Cloud computing environments are also virtual by nature but their main difference is that cloud computing services are on demand unlike virtual machines.

    in reply to: OCU C)NP A Week 04 Lesson 07 Discussion #90335
    jmontgomery2
    Participant

    The proxy firewall is one control that will harden a network against attacks. The proxy firewall uses a false IP address that is exposed to the outside internet. This creates a middle man that will cut contact with a client or server that is not trustworthy. The proxy firewall is stronger than simple packet filtering as it provides an extra layer of protection. But it is weaker than other more advanced forms of firewalls employed to protect networks from cyber attacks.
    Data deletion is a control that also helps harden a network from bad actors. Keeping around old sensitive data creates a liability for the network overseer. Deletion of data can be completed in a handful of ways. These include, encryption, the scrambling of the data so it would need to be decoded to be useful. Physical destruction, physically destroying the disk or drive that the information is stored on, this is the easiest way to ensure that nothing can be recovered. And overwriting the data, or copying new information over the previous data on the hard drive.

    in reply to: OCU C)NP A Week 03 Devotion #90017
    jmontgomery2
    Participant

    This verse weighs heavy on my soul for many reasons that are quite personal. But what Christ says is true, it is better to cut off a part of yourself and cast it away than to allow your whole self to be cast into eternal damnation. The kingdom of Heaven should be what we seek first and our desires should come second in every scenario. I strive everyday to live in the freedom that was bought for me by Jesus Christ and to not waste that gift of freedom from addiction He died for on the cross. Everything is covered by His blood alone and I owe it to Him to live my life for Him for what He did for me.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #90014
    jmontgomery2
    Participant

    These are all very good examples of threats to cyber security that a company may face. Worms are quite scary given the fact that they can reproduce without a host to feed off of. This could allow them to potentially spread through multiple devices before the initial victim could figure out what had happened. In addition, careless employees could cause companies to suffer severe damage through no malicious actions. Just general incompetence could cause security threats that require serious retribution to fix. Great post, I agree with all of your points and you articulated them clearly.

    in reply to: OCU C)NP A Week 03 Lesson 06 Discussion #90011
    jmontgomery2
    Participant

    A major goal that companies want to achieve is to reduce the risk of their cyber security being compromised. If that were to happen, the majority of a company’s sensitive information would be vulnerable to bad actors. Another goal that companies seek to attain is a strong defense against cyber attacks that are bound to happen. There will be no shortage of hackers or malicious individuals who want to gain access to a companies money or information that they could sell on a black market.
    Threats that companies face can come in all shapes and sizes. The first threat is the trojan horse virus. This piece of malware masquerades as a friendly or legit piece of data or information, often in the form of an email. And when it is interacted with the virus will spring into action and infect the users device. The Zeus virus is particularly dangerous trojan horse virus that can spread through email servers undetected. A second threat that a company can find themselves up against is social engineering. This type of cyber attack takes place on the human level and requires bad actors to manipulate individuals to give them access to sensitive information. This be as benign to asking for favors consistently to eventually get one big favor or brash manipulation by charismatic hackers. Through proper preventative measures and security protocols being in place, companies can scan for potential virus hiding in spam emails and be able to resist social engineering of people who only want to cause harm.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #90009
    jmontgomery2
    Participant

    I very much enjoyed your knowledge on the 802.11 standard of WiFi. There have been many contemporaries that are based off of the classic standard from 1997. The speed of throughput has truly grew exponentially in the past 20 plus years as well. Going from a few kilobytes per second to almost multiple gigabytes per second on some advanced networks. Technological advancements in telecommunications are a wonderful sight to behold.

    in reply to: OCU C)NP A Week 03 Lesson 05 Discussion #90008
    jmontgomery2
    Participant

    The first wireless LAN standard is the 802.11a wifi standard that premiered in 1997. Working on a 5 GHz frequency, this standard was useful for industrial applications. It uses MAC addresses similar to ethernet frames for it’s allocations and organization of traffic. Due to the common frequency in use, microwave ovens, cordless phones, and bluetooth can cause interference in rare occasions.
    The second wireless LAN standard is 802.11p. This standard is used specially for dedicated short range communications. This is from a government project (The Department of Transportation) from the previous communications access for land mobiles. The practical applications for this standard are primarily communication between motor vehicles and roadside checkpoints. One example that comes to mind are toll booths and the EZpass transponders that many cars and trucks use.

Viewing 15 posts - 1 through 15 (of 24 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .