Latoya Stoudmire
Forum Replies Created
-
AuthorPosts
-
Latoya Stoudmire
ParticipantHello Branden,
I like that you started with employee training to mitigate some potential risk. I don’t think people realize how important it is to keep people informed on how to detect cyber threats or even notice any suspicious activity. Some people I work with are totally oblivious to what trojans or spyware are. This is why I feel employee training on the subject is imperative. Despite having training I agree that it is important to still have antispyware installed to counter any potential threats.
Latoya Stoudmire
ParticipantHello Jacob,
You are absolutely right in regards to how common scamming has become. I have also heard of people getting similar calls attempting to obtain a persons information. I also think that face recognition is not a reliable source of security. I personally have been hacked using facial recognition. I think it is a nice feature but I would not use it to safe guard any sensitive information.
Latoya Stoudmire
ParticipantIn 2022, both android and iOS faced cyber-attacks in a multitude of ways. Hackers used Malware and ransomware, mobile app vulnerabilities and QR code scans to hack into customer phones yet, many other methods were used while gaining access to user devices. Mobile banking Trojans were used to gain access to users, login credentials allowing hackers to access customer sensitive information like financial information. This Trojan was used in a phishing tactic where users clicked on an insecure link. An example of this is where Flagstar Bank, which had 1.5 million customers (about the population of West Virginia) have their Social Security numbers and financial information breached.
QR codes gained popularity in 2020 due to their convenience unfortunately QR codes have also become a more simplistic unidentifiable way for hackers to get access to customer information. At times Hackers will use posters or advertising with The QR codes from there when the customer attempts to engage with the QR code the hackers are able to then gain access to the customers information and data. This can be mitigated by only using trusted QR codes. Another way to mitigate the issue with QR codes would be to ensure to check the URL prior to going to the link once capturing the QR code. Using some of the hacking methods listed above, hackers can take control of your device while being remote. It is important to be aware of your updates on your phone and if you are experiencing any slow running or malfunctioning apps it is important to ensure that your phone has not been hacked by any type of malware or virus.
.
Latoya Stoudmire
ParticipantWhen considering vulnerabilities, the most common is typically user error, this can occur in a multitude of ways. This can be from week passwords where a user may have not updated their password correctly this occurs If a user has a weak password or if they continuously use the same password. Another vulnerability from users is phishing. If a user is not mindful of the information they are giving or who they are speaking with directly. This could leave an organization’s security state very vulnerable exposing them to hackers. Another vulnerability that can often is not viewed as important is system updates. It is important for organizations to keep their system updated with the most current versions of spyware and protection. There are multiple ways to mitigate some of these threats from occurring one way would be to ensure that all employees are continuously using strong passwords that are updated on time intervals, this would allow the user to constantly changed your password. While ensuring that it is strong enough to prevent hacking, ensuring that our updates are complete and that you are using the most current version of any spyware and is system to keep all information and data protected. Training employees in how to be aware of phishing emails. Another way to mitigate phishing attacks would be to implement DMARC (Domain-based Message Authentication, Reporting & Conformance). DMARC ensures messages are coming from a secure source
Latoya Stoudmire
ParticipantThere are multiple policies needed to ensure a strong security program. Some of those programs consist of information security access control, data protection and incident response, just to name a few. A company’s information security policy sets the standard. It allows the company to make clear what their requirements are to operate at their full potential in a secure environment. With this policy we see the CIA triad confidentiality, integrity, and availability. We also consider risk management strategies in this policy. Another important policy that cannot be overlooked is the access control policy. This policy Is used to monitor and make clear which users have access to which systems or applications. This policy is important seeing how most security issues are caused by users. The access control policies are put in place to inform an organization of any users attempting to access information that they are not governed. The incident response policy is also important to an organization’s data safety. The incident response policy negates how any events or potential threats will be handled in an organization. The policy will give a detailed explanation on how different events should be documented and handle, and in some cases, it will give step-by-step procedures for handling the specific incident. There are more policies that I have not discussed yet. These are the policies I thought were most imperative to securing an organization’s data.
Latoya Stoudmire
ParticipantHello Trae,
I really like the description that you gave in your discussion. I felt it was very detailed seeing how it listed all of the standards with the dates times and reasons they were created. I was able to even learn a few things about different encryptions and a few versions of Wi-Fi standards that I overlooked. I also thought your encryption detail was very descriptive. Have you ever personally work with this type of software in a commercial setting?Latoya Stoudmire
ParticipantThere are several different types of Wi-Fi standards. The first was introduced in 1997. In 1997 the IEEE (institute of electrical and electronic engineers) introduced IEEE 802.11. This standard speed was 2 Mbps. Shortly after the introduction of the IEEE 802.11 came the 802.11a the standard was used to assist with traffic interference with other devices on the frequency 2.4. 802.11a uses 5Ghz frequency. That same year 802.11b was developed but uses frequency 2.4Ghz. 802.11b is used in home settings and 802.11a is used in a commercial setting. In 2003 802.11g combined the features of 802.11a and 802.11b using frequency 2.4Ghz. 802.11n allowed for both 802.11a and 802.11b features to use frequencies 2.4Ghz and 5Ghz in 2009. In 2013 802.11ac standard operates on 5Ghz with a speed of 1.5 Gbps. 802.11n is the most commonly used standard in households today. The most advanced version is the 802.11ax this runs on Both 2.4Ghz and 5Ghz. This standard allows for 40% more traffic.
Asides from the Wi-Fi standards there are also Wi-Fi encryption standards. WEP, WPA, WPA2, and WPA3 are Wi-Fi security protocols that prevent unauthorized access and eavesdropping on wireless. WEP is Wired Equivalent Privacy, it was introduced in 1997 with the 802.11. A 64–128-bit encryption is used to keep information confidential. The WEP uses static keys for encryption. The WPA is also known as Wi-Fi Protected Access. This type of encryption uses packets and has a dynamic key. WPA uses 128-bit encryptions and TKIP (Temporal Key Integrity Protocol) to ensure the data is encrypted. WPA2 and WPA3 are each updated and improved versions of WPA. The most current and secure version is WPA3 which uses a 256-bit encryption.
Šlekytė, I., & Šlekytė, I. (2024, September 22). WEP, WPA, WPA2, and WPA3: Main differences | NordVPN. NordVPN. https://nordvpn.com/blog/wep-vs-wpa-vs-wpa2-vs-wpa3/
GeeksforGeeks. (2021, March 17). WiFi standards explained. GeeksforGeeks. https://www.geeksforgeeks.org/wi-fi-standards-explained/
Latoya Stoudmire
ParticipantHello Jessica,
I like how detailed your discussion was in regards to the ways the RJ45 is used. I also like how you gave a detailed description of how the RJ 45 looks. I think its important to know how each connector looks especially the connectors most commonly used. I do have a question though. Is the HDMI considered a cable or a connector? I thought it was a cable but it seems as though I might be wrong.
Latoya Stoudmire
ParticipantHello Branden,
I think network trouble shooting is often overlooked. I agree a lot of issues with printers can originate with network connections. As you said in your statement I notice this most with wireless printers. I believe most common issue with printers are jams. I also like how you gave multiple ways to troubleshoot the issue including hardware and software options.
Latoya Stoudmire
ParticipantHello Jason,
This was very informative seeing how did not personally know that running multiple apps can cause your mobile device to overheat. Nor did I know that phones can overheat from too much sun exposure. I did however notice that when running multiple apps on my phone that it kills the battery a lot faster but I didn’t know that blue-tooth connections can also drain batteries. I also was unaware that Overcharging a battery can effect your battery life
Latoya Stoudmire
ParticipantThere are several different ways to trouble shoot printers. The trouble shooting method used will always depend on the type of printer and the issue the printer is having. There are some common trouble shooting methods that are used for printers. An issue that most printers face is ink streaks. To trouble shoot this issue some practical options are to check the ink cartridge to ensure it is not too full or not full enough, ensure that the printer head is not clogged, and you have properly removed all protective shields from the ink cartridge.
A simple trouble shooting method often overlooked is changing the paper in the printer. If a printer is loaded with the incorrect type of paper required for the printer, it can cause the printer to malfunction. In some cases, the paper causes the printer to jam. To correct a printer with the wrong paper, you can find the correct paper size. If the printer did jam due to the incorrect paper, you will first need to remove the jammed sheet of paper. Removing the paper tray, locating the jammed sheet of paper, and removing it for the printer will typically clear the jam. In some cases, after removing the jam the printer will require a restart.
Latoya Stoudmire
ParticipantThe most common type of cable connector is the RJ 45, This is also referred to as registered jack 45. The RJ 45 is primarily used to connect a device to a network. The RJ 45 connector is typically used with twisted pair cables, it has 8 pins of contact. This allows for four twisted wire pairs. Cables Cat5, Cat5e, Cat6, Cat6a, Cat7, and Cat7a cables use the same RJ45 connectors. Despite the RJ 45 having 8 pins and 8 wire contacts it also has a tab feature that helps secure the wires in place. (Smoot, 2022)
BNC connector is also called a Boayonet neill-concelman. This connector is used with coaxial cables. This is used in radio frequency. BNC connectors are also used heavily in video applications. The BNC connector provides a secure connection with high quality. Although the BNC connector is a valuable connector in securing high quality data in video surveillance the RJ 45 connector is used more commonly. (imops@saffronedge.com, 2024)
imops@saffronedge.com. (2024, July 5). Types of Cables and Connectors in Computer Networks. Network Drops. https://networkdrops.com/blog/different-types-of-cables-and-connectors-in-computer-network/
Smoot, J. (2022, June 2). RJ45 Connectors – What You Need to Know. Digi-Key Electronics. https://www.digikey.com/en/articles/rj45-connectors-what-you-need-to-know
Latoya Stoudmire
ParticipantThere are several diverse types of mobile devices. Each mobile device must rectify any trouble shooting issues differently. Some mobile devices are laptops, cell phones, smart watches and more. When trouble shooting a device like a cell phone it is important to first identify the issue with, the device. If the device is having an issue connecting to a network, to trouble shoot the issue first check the device network setting. Ensure that the device is connecting to a network that is available. You also want to ensure the network credentials are correct when trying to access an internet connection.
Laptops are a mobile device that can use some of the same techniques for trouble shooting as a PC. Laptops and PC’s have some of the same hardware components such as a motherboard a Ram and other components. Similar to trouble shooting a PC, when trouble shooting a laptop, it is important to first identify the problem. When trouble shooting one of the first steps to take is checking the power source check. You do this by checking all the cables and battery connectivity are established. Another trouble shooting method is to ensure the laptop is running at its most current version. CPU overheating sometimes can be an issue for the laptop. To trouble shoot the CPU you can clean the CPU fan and heatsink with compressed air. (Knotts, 2024) There a numerous ways to trouble shoot a mobile device but each depends on the type of device and its issues
Latoya Stoudmire
ParticipantWhen trouble shooting display devices you must consider if the device issue is with the hardware or software. Software and Hardware must be rectified differently. There are many potential software issues. Some software issues consist of trouble with overheating, flickering images, and artifacts. Hardware Issues can consist of multiple issues like loose cables, expansion cards not properly placed, or no power source.
When trouble shooting display hardware device issues the first step is to always check the power source. A power source such as a cable not being plugged in or an faulty outlet could be an issue that causes problems with display. Another issue is that a particular expansion card could not be compatible with the device. If an expansion card is not compatible with a PC PCI slot, then the PC could experience display issues. To trouble shoot this ensure that the expansion card is compatible with the PCI.
Issues a PC could experience with software display are flickering images. To trouble shoot a flickering image you should update your graphics drivers to ensure it is performing at its latest version. Another trouble shooting technique would be to try ending programs that could be affecting your graphics card.
Latoya Stoudmire
ParticipantThere are many distinct types of input and output devices. Some of the input devices include Barcode readers, NFC readers, microphone, and a digitizer. All are important and play key roles in a computer’s ability to receive information. Some of the output devices are displays, printers and speakers. The output devices are also essential seeing how they allow the device to sed communication to the user.
An NFC, also known as near field communication reader, is an output device that is extremely popular with merchants and business owners. An NFC allows customers to make purchases with contactless payments. With NFC a customer can use their phone or card that has a magnetic chip and make payments to merchants. This is done by using Radio Frequency Identification. “RFID has been used in places for decades for things like scanning items in grocery stores and luggage on baggage claims and tagging cattle.” (Square, 2024).
Popular output devices are monitors, speakers, and printers. Each of these devices allows communication between the user and the device. This communication ranges from visual graphics that appear on the screen to the speakers used for audio calls or listening to music.
-
AuthorPosts