Mile2 Cybersecurity Certifications

Latoya Stoudmire

Forum Replies Created

Viewing 15 posts - 31 through 45 (of 55 total)
  • Author
    Posts
  • in reply to: OCU C)HT B Discussion Lesson 06 #98636
    Latoya Stoudmire
    Participant

    Physical storage is sometimes referred to as local storage. Physical storage includes hard disk drives, solid-state drives, and USB flash drives. Each of the physical storage drives plays a different role in storing data.

    The hard disk drive works by allowing an arm to move rapidly on the disk reading and writing data in small sections called sectors. The sectors are then combined to create larger files. I hard drive can hold a range of information spanning from 500 GB to 10 TB.

    Solid state drives also known as SSD can replace traditional HDD drives. One of the largest differences between HDD and SDD is that SDD is faster. SDD can load applications and save data at a fraction of the time it takes HDD. Instead of an arm SSD uses a flash controller to read, write and store data.

    Another physical storage is USB Flash drives. Flash drives like SSD use a flash connector to read data yet, USB Flash drives are portable. The drive is plugged into the PC and a notification informs the user of the device. Once the user can access the device, they can then save new information or pull up stored information on the disk.

    in reply to: OCU C)HT B Discussion Lesson 05 #98635
    Latoya Stoudmire
    Participant

    There is a wide array of expansion options. The options vary from memory, graphics, and networking. Expansion options are imperative to the functionality of the device, Expansions cards can be used to bring new capabilities to a device that will not be possible without the expansion capability.

    A popular expansion card is a graphic card. The graphic card is also referred to as the video card or the graphics processing unit (GPU). The GPU is used to enhance the video experience. “It accelerates the graphics processing capabilities of your computer, enabling you to enjoy smooth and high-quality visuals in games, videos, and other graphic-intensive applications. The graphics card works with the central processing unit (CPU) to process and output visual data.” (What Is a Graphics Card? And Why Do I Need One? | Lenovo US, 2023). The GPU would be the most ideal for a gamer or someone needing high quality graphics.

    Network cards are another popular expansion. Network cards are also known as network interface cards (NIC). The NIC assists with networking communication at higher speeds. Majority of PC’s include a NIC.The NIC can be viewed as the intermediary between a computer and a data network.

    in reply to: OCU C)HT B Discussion Lesson 03 #98567
    Latoya Stoudmire
    Participant

    Hello Jason
    I followed a lot of the same steps as yourself. I like that you started from the easiest thing to correct and branched out from there. The use of an ESD strap is often times overlooked but very useful in preventing a person from being electrocuted. I have never used the multimeter method but I have used the paper clip method. which do you find more effective?

    in reply to: OCU C)HT B Discussion Lesson 02 #98566
    Latoya Stoudmire
    Participant

    Hello Jessica great response. You have a great way of simplifying information. I think you did a great job explaining the motherboard features especially the bios and uefi. After reading your discussion I went back and researched the bios more.

    in reply to: OCU C)HT B Discussion Lesson 01 #98565
    Latoya Stoudmire
    Participant

    Hello Jason I like how you used real life instances to better explain the troubleshooting process. I agree that both business and customers can face issues requiring them to trouble shoot. Each party may take different measures to resolve the issue but as you said all steps should be documented to prevent future issues.

    in reply to: OCU C)HT B Discussion Lesson 01 #98564
    Latoya Stoudmire
    Participant

    Thank you I come to understand its best to document all steps taking when your troubleshooting any device.

    in reply to: OCU C)HT B Discussion Lesson 02 #98466
    Latoya Stoudmire
    Participant

    The motherboard and the CPU are vital aspects of a computer. Each has a lot of responsibilities. The motherboard’s primary responsibility is acting as the backbone of a computer device. The motherboard is the connecting point in a computer for components such as RAM, chipsets, and CPU. A large motherboard may include six to 14 layers of fiberglass, copper connecting traces and copper planes for power and signal isolation. Kirvan (2022)

    The CPU Also plays a huge role in a device. The CPU acts as the computer’s brain. The CPU can run many tasks simultaneously. Some of the tasks the CPU is responsible for are overseeing power consumption, allocating computing resources and interfaces with various apps, programs, and networks. (Powell & Smalley, 2024) Most electronic devices that allow internet access or access to an application have a CPU. The CPU works with other componentry devices to ensure efficiency.
    Kirvan, P. (2022, June 6). motherboard. WhatIs. https://www.techtarget.com/whatis/definition/motherboard

    Powell, P., & Smalley, I. (2024, September 3). CPU. what is CPU. https://www.ibm.com/think/topics/central-processing-unit

    in reply to: OCU C)HT B Discussion Lesson 02 #98465
    Latoya Stoudmire
    Participant

    The motherboard and the CPU are vital aspects of a computer. Each has a lot of responsibilities. The motherboard’s primary responsibility is acting as the backbone of a computer device. The motherboard is the connecting point in a computer for components such as RAM, chipsets, and CPU. A large motherboard may include six to 14 layers of fiberglass, copper connecting traces and copper planes for power and signal isolation. Kirvan (2022)

    The CPU Also plays a huge role in a device. The CPU acts as the computer’s brain. The CPU can run many tasks simultaneously. Some of the tasks the CPU is responsible for are overseeing power consumption, allocating computing resources and interfaces with various apps, programs, and networks. (Powell & Smalley, 2024) Most electronic devices that allow internet access or access to an application have a CPU. The CPU works with other componentry devices to ensure efficiency.
    Kirvan, P. (2022, June 6). motherboard. WhatIs. https://www.techtarget.com/whatis/definition/motherboard

    Powell, P., & Smalley, I. (2024, September 3). CPU. what is CPU. https://www.ibm.com/think/topics/central-processing-unit

    in reply to: OCU C)HT B Discussion Lesson 03 #98468
    Latoya Stoudmire
    Participant

    There are several different techniques you can use when troubleshooting a PC power supply. The simplest technique would be checking the power outlet supply sourcing the computer. Often, a power supply issue can be as simple as a faulty connection. The faulty connection can be the result of an outlet not working or a cable not being connected properly. Discharging the computer is another troubleshooting method used. Discharging the computer consists of unplugging all the cable connections from the computer and waiting for a brief period then reconnecting all the cables. Another troubleshooting method is one called the jumper test method. The jumper test is also known as the paper clip method. The paper clip method allows you to verify PSU functionality when it is disconnected from the components inside a PC. This test will identify some common issues like short circuits inside the power supply, Failed components, and a live power connection. (smartbuyer)

    How to troubleshoot a PC power supply – newegg business smart buyer. (n.d.-b). https://www.neweggbusiness.com/smartbuyer/components/how-to-troubleshoot-a-pc-power-supply/

    in reply to: OCU C)OST B Discussion Lesson 11 #98337
    Latoya Stoudmire
    Participant

    SOHO router stands for small office home office. This router can either be wired or wireless. The router acts as a gateway between your network and the internet. This router directs the traffic of other devices on the same network. A SOHO router can allow users to connect to a company’s database remotely. Other benefits of a soho router are it’s abilty to provide services like Dynamic Host Configuration (DHCP). This feature is used to automate the process of assigning IP addresses and other configurations. GeeksforGeeks (2024) Another feature is Network address translation (NAT) this feature allows a connection between public and private networks like the internet. (What Is Network Address Translation (NAT)?, 2023) Quality of service (QOS) networking is used to adjust overall network traffic by prioritizing high-performance applications. (What Is Quality of Service (QoS) in Networking? | Fortinet, n.d.)

    What is Network Address Translation (NAT)? (2023, July 12). Cisco. https://www.cisco.com/c/en/us/products/routers/network-address-translation.html

    GeeksforGeeks. (2024, August 1). Dynamic Host Configuration Protocol (DHCP). GeeksforGeeks. https://www.geeksforgeeks.org/dynamic-host-configuration-protocol-dhcp/

    What is Quality of Service (QoS) in Networking? | Fortinet. (n.d.). Fortinet. https://www.fortinet.com/resources/cyberglossary/qos-quality-of-service

    in reply to: OCU C)HT B Discussion Lesson 01 #98445
    Latoya Stoudmire
    Participant

    Troubleshooting is valuable due to all the information you are given during the process. The trouble shooting process can help to identify issue prior to it arising. When troubleshooting for one issue it is common to discover another issue the device is having while running a diagnostic scan. There are countless methods of troubleshooting that can be used when diagnosing a device. Another instance where troubleshooting is valuable, is when creating preventative measures. The information collected while trouble shooting can be used to put standards in place that assist with company efficiency and accuracy. What makes troubleshooting most valuable is its ability to rectify computer issues. When using trouble shooting features you can rectify a large scale of issues ranging from hardware and software. Once those issues are resolved you are able to document the process creating a call to action for similar issues in the future.

    in reply to: OCU C)OST B Discussion Lesson 10 #98336
    Latoya Stoudmire
    Participant

    Mobile devices have vulnerabilities that can allow hackers access to sensitive information. Improper credential usage is a vulnerability that leaves user data accessible. This occurs when credentials are used incorrectly or are hardcoded. (Asee 2023) insufficient input and output validation is a vulnerability that does not validate data input from outside sources. When the incoming data is not validated, hackers can access sensitive data. Another vulnerability mobile devices face is inadequate privacy control. Inadequate privacy control correlates closely with personal identifiable information (PII). If users PII is leaked it leaves devices vulnerable to attacks. If hackers can access a person’s financial information this could result in unauthorized transactions that could be financially devastating. Ways to prevent these types of attacks are by keeping your mobile device updated, adding more security authentication.

    Physical hardware is also susceptible to vulnerability. Outdated device firmware can lead to being plagued by bugs and security flaws. Wright (2023) Lack of encryption can also lead to attacks on physical hardware. When an organization grows it can sometimes add innovative technology that does not have a strong encryption. This leaves companies vulnerable to attacks. A way to prevent these types of vulnerability is to ensure you buy hardware from a reputable vendor, enforcing access control areas where hardware is placed, and adding weekly vulnerability scanning. Wright (2023)

    Wright, K. (2023, January 13). Top 10 hardware vulnerabilities MSPs should watch out for. inSOC. https://in-soc.com/blog/top-10-hardware-vulnerabilities-msps-should-watch-out-for/

    in reply to: OCU C)OST B Discussion Lesson 09 #98320
    Latoya Stoudmire
    Participant

    Three types of physical security hardware are intrusion detection, surveillance systems, and access control systems. All three hardware systems a highly effective and prevent the intrusion of unwanted persons. Each system serves a different purpose that ensures the physical protection of data.

    There are five types of intrusion detection systems, a few are Network-based intrusion detection systems, Host-based intrusion detection system, and Protocol-based. (What Is an Intrusion Detection System?, n.d.) Network based intrusion detection monitors all traffic flowing from and to devices on the protected network. This is valuable today due to the advanced malware that hackers use.

    In today’s society it is imperative for surveillance systems. Surveillance systems use to be used on more of a commercial basis but since the introduction of affordable home surveillance like the Ring camera surveillance systems have become accessible to majority of consumers, allowing to monitor camera activities from the phone or computer.

    Access control systems are physical hardware that has become indispensable. Access control systems set specific restrictions for access to areas of company property. Three types of access control systems are role-based access control, attribute access control and discretionary access control. (Locksmiths, 2023) All three systems are used to protect sensitive areas by only allowing users with those credentials to access the area.

    What is an Intrusion Detection System? (n.d.). Palo Alto Networks. https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids

    Locksmiths, F. (2023, February 27). What are the 3 types of access control? | Access control security. The Flying Locksmiths. https://flyinglocksmiths.com/blog/three-types-of-access-control/#:~:text=The%203%20types%20of%20access%20control%20are%20Role%2DBased%20Access,property%20and%20data%20is%20secure.

    in reply to: OCU C)OST B Discussion Lesson 08 #98319
    Latoya Stoudmire
    Participant

    Three types of physical security hardware are intrusion detection, surveillance systems, and access control systems. All three hardware systems a highly effective and prevent the intrusion of unwanted persons. Each system serves a different purpose that ensures the physical protection of data.

    There are five types of intrusion detection systems, a few are Network-based intrusion detection systems, Host-based intrusion detection system, and Protocol-based. (What Is an Intrusion Detection System?, n.d.) Network based intrusion detection monitors all traffic flowing from and to devices on the protected network. This is valuable today due to the advanced malware that hackers use.

    In today’s society it is imperative for surveillance systems. Surveillance systems use to be used on more of a commercial basis but since the introduction of affordable home surveillance like the Ring camera surveillance systems have become accessible to majority of consumers, allowing to monitor camera activities from the phone or computer.

    Access control systems are physical hardware that has become indispensable. Access control systems set specific restrictions for access to areas of company property. Three types of access control systems are role-based access control, attribute access control and discretionary access control. (Locksmiths, 2023) All three systems are used to protect sensitive areas by only allowing users with those credentials to access the area.

    What is an Intrusion Detection System? (n.d.). Palo Alto Networks. https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids

    Locksmiths, F. (2023, February 27). What are the 3 types of access control? | Access control security. The Flying Locksmiths. https://flyinglocksmiths.com/blog/three-types-of-access-control/#:~:text=The%203%20types%20of%20access%20control%20are%20Role%2DBased%20Access,property%20and%20data%20is%20secure.

    in reply to: OCU C)OST B Discussion Lesson 08 #98318
    Latoya Stoudmire
    Participant

    Three network vulnerabilities are weak password, malware and keyloggers. Each possesses its own distinctive threat. Each of the vulnerabilities must be addressed in specific ways to rectify.

    Malware is short for malicious software. The are several types of malicious software. some types of malicious software are Trojans, viruses, ransomware, and worms. Malware is used to lock up PC’s and networks making them unusable. (The Future of Ransomware: Inside Cisco Talos Threat Hunters, 2024). It also has the capability to steal computer resources and monetize by selling company data. Ways to prevent malware attacks are to ensure all updates are completed on devices, strong authentication, and antivirus protection.

    Weak passwords are often overlooked when thinking of network vulnerability. Passwords are often considered the weakest link in an organization’s network. (Specops Software, 2022). 98% of passwords include 8 characters and per a report from google 65% are often reused for different application (Specops Software, 2022). To protect your devices from this type of intrusion it is important to ensure that you are not reusing passwords, using several types of character in your password helps prevent attacks, and not using personal information in your passwords are ways to prevent hackers from accessing your passwords

    Keyloggers are another vulnerability. Keylogger is short for keystroke logger. Keylogger records all keystrokes on the device being used. This gives hackers the ability to track passwords and other sensitive information. A way to combat keyloggers are using a virtual keyboard, keeping software updated, and regular security scans. (2024)

    Specops Software. (2022). THE 2022 WEAK PASSWORD REPORT [Report]. https://specopssoft.com/wp-content/uploads/2022/02/Specops-Software-Weak-Password-Report-2022-2.pdf

    The future of ransomware: Inside Cisco Talos threat hunters. (2024, June 18). [Video]. Cisco. https://www.cisco.com/site/in/en/learn/topics/security/what-is-malware.html#jump-anchor-1

    Keyloggers explained: How to protect against keyloggers. SOPHOS. (2024, September 23). https://www.sophos.com/en-us/cybersecurity-explained/keylogger

Viewing 15 posts - 31 through 45 (of 55 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.