Mile2 Cybersecurity Institute

Mjulius513

Forum Replies Created

Viewing 15 posts - 31 through 45 (of 127 total)
  • Author
    Posts
  • in reply to: OCU C)ISSO A Discussion Lesson 06 #111380
    Mjulius513
    Participant

    Our company is looking for an Operations Security Manager to support daily IT operations and keep them secure. This role focuses on ensuring our systems are safe, stable, and well-managed. The Operations Security Manager will check system logs, monitor activity, and report any unusual behavior. They will also manage important documents and logs to ensure they are stored safely and kept for the required time.

    Another important duty is overseeing the change control process. This includes reviewing proposed system changes, assessing security risks, and approving changes when suitable. The manager will also handle patch management by scheduling, testing, and installing updates to protect our systems. Additionally, this position involves managing user access rights to ensure employees have only the access they need for their jobs. The ideal candidate should be organized, responsible, and able to follow security policies to keep the company safe and reliable.

    in reply to: OCU C)ISSO A Discussion Lesson 05 #111375
    Mjulius513
    Participant

    I would start with the Zachman Framework, a structured approach to organizing and viewing an entire enterprise. It helps organizations understand how their systems, processes, and data fit together. The framework uses different perspectives, such as planner, owner, designer, and builder, to make sure nothing important is overlooked. Zachman is described as a framework that enhances clarity by breaking complex systems into smaller, more understandable pieces, helping teams communicate effectively and align their goals.

    The second framework is ITIL (Information Technology Infrastructure Library). ITIL aims to improve IT service management by providing best practices for delivering reliable and efficient services. The book and video explain how ITIL helps organizations standardize processes such as service portfolio management, financial management, and strategy for IT services. ITIL also focuses on aligning IT with business goals, improving service quality, and reducing unnecessary costs. By following these structured processes, organizations can respond to issues more quickly and ensure that services remain stable and consistent for users.

    in reply to: OCU C)ISSO A Discussion Lesson 03 #111321
    Mjulius513
    Participant

    Your explanation clearly shows how identity management, authentication, single sign-on, and access control all work together to secure systems. I agree that single sign-on enhances both convenience and security by utilizing a single verified identity across multiple services. Monitoring permissions and logs is also essential because it ensures that users only access what they’re authorized to access and helps detect unusual activity.

    in reply to: OCU C)ISSO A Devotion 01 #111297
    Mjulius513
    Participant

    I really agree with what you shared. Reading this makes me feel that we all have a unique role, even if it doesn’t seem big at first. I think that everyone has something placed in them by God, and it activates when it’s our time to use it. Sometimes, we don’t even realize the value of what we have until God puts us in the right moment or situation.

    Just like how God used people who seemed small or unimportant in the world’s eyes, He can use us too. It’s encouraging to know that we don’t have to be perfect or influential for God to work through us. We need to be willing and ready when our time comes. Ecclesiastes 3:1 “For everything there is a season, and a time for every purpose under heaven”.

    in reply to: OCU C)ISSO A Discussion Lesson 04 #111239
    Mjulius513
    Participant

    I like how you clearly described identification, authentication, authorization, and accountability. These steps really help keep systems safe. The threats you mentioned, like password attacks, social engineering, and insider misuse, are also major issues today. Understanding these risks helps companies set stronger controls and protect their information more effectively.

    in reply to: OCU C)ISSO A Discussion Lesson 02 #111238
    Mjulius513
    Participant

    Your explanation is clear, and I agree with it. Information security management helps a company protect its data by using the right controls while staying within budget. Using administrative, technical, and physical controls together is important. Administrative controls guide people, technical controls protect systems with tools like firewalls, and physical controls secure the building. When all three work together, the company stays safer without slowing down employees.

    in reply to: OCU C)ISSO A Discussion Lesson 01 #111229
    Mjulius513
    Participant

    Your explanation of risk is clear, and I agree that understanding threats and assets is important for strong security. Risk assessment helps identify what could harm the company, while controls like firewalls, guards, and policies reduce that danger. Good risk management really depends on constant monitoring and updating protections.

    in reply to: OCU C)ISSO A Discussion Lesson 04 #111213
    Mjulius513
    Participant

    Access control methods decide how users get permissions and how those permissions are managed and enforced. One method is administrative control, where policies and procedures define who gets access and how. For example, administrators must follow a formal process for granting user rights based on job roles. The video shows a Security Officer reviewing user access logs to ensure proper administration of permissions. Another method is using the RADIUS protocol for authentication, authorization, and accounting (AAA).

    One pro of RADIUS is that it provides a central point of control for user logins across many services, making administration easier. It also supports multiple authentication methods and works well for large networks. A con of RADIUS is that it only encrypts the password in transit and may leave other data exposed. Also, setting up a RADIUS server can be complex and requires significant resources. By combining strong administrative practices with RADIUS’s technical capabilities, organizations can enforce good access control and maintain strong security.

    in reply to: OCU C)ISSO A Discussion Lesson 03 #111211
    Mjulius513
    Participant

    Identity management, authentication techniques, single sign-on, and access control monitoring all work together to manage who can enter a company’s systems and what they are allowed to do. They help protect Confidentiality and Integrity, which are part of the CIA Triad.

    Identity management uses identification and authorization to assign user accounts and permissions. In the video, the Security Manager creates policies for how accounts should be managed, while the Security Officer follows those policies and sets up accounts for employees.

    Authentication techniques use passwords, tokens, or biometrics to prove identity. The Security Manager sets out the rules for strong authentication, and the Security Officer makes sure employees follow them when logging in.

    Single sign-on (SSO) supports access control and least privilege by allowing users to log in once and access multiple systems. The Security Manager approves SSO, and the Security Officer configures it correctly.

    Access control monitoring uses audit logs and accountability to track user activity. The video showed the Security Officer reviewing logs while the Security Manager decides what actions to take if something looks suspicious.

    in reply to: OCU C)ISSO A Discussion Lesson 02 #111195
    Mjulius513
    Participant

    Information security management is important for a company because it protects valuable things like data, computers, and accounts. It also helps the company work without problems. A key idea in security is the Triad: Confidentiality, Integrity, and Availability.

    Confidentiality means only the right people can see the information. Integrity means the information stays correct and is not changed by mistake or on purpose. Availability means the information and systems are ready to use whenever they are needed.

    Another important part of security is controls, which are steps taken to lower risks. Administrative controls include rules, policies, and training. Technical controls include tools like firewalls, passwords, and encryption. Physical controls include locks, badges, and security cameras. These controls help protect the company from different threats.

    Policies are also necessary because they explain what employees should do and how they should act. When the Triad, controls, and policies work together, they help keep the company safe and successful.

    in reply to: OCU C)ISSO A Discussion Lesson 01 #111194
    Mjulius513
    Participant

    Risk management is the process of understanding what could harm an organization and deciding how to protect it. In the video, they explained that we start by looking at what assets we have, like data, computers, and people. Risk management helps us stay organized, so we don’t miss anything important.
    Risk assessment is a major step in risk management. This is where we identify threats, such as hackers or accidents, and look for vulnerabilities, like weak passwords or unlocked rooms. I learned how even small weaknesses can create big problems if a threat takes advantage of them. During risk assessment, we also think about the impact, meaning how much damage the organization would suffer if something went wrong.
    Responding to risk means choosing what to do after we understand the risk level. I learned to talk about options like mitigating the risk by adding controls, avoiding the risk by stopping the activity, transferring it with insurance, or accepting it if it is low.

    in reply to: OCU C)SP D Week 05 Lesson 11 Discussion #110975
    Mjulius513
    Participant

    I agree with you. Having clear security policies is very important to protect data and systems. Training employees, using access controls, and keeping software updated makes a big difference. Backups and response plans help if something goes wrong. These simple steps really help a company stay safe and ready for any security threats.

    in reply to: OCU C)SP D Week 05 Devotion #110968
    Mjulius513
    Participant

    This verse reminds me that the things of the world can never truly satisfy us. We can eat the best food, buy nice things, or chase after fame, but our hearts still feel empty without God. The world gives us many things for the body, but only God can feed the soul. When we hunger and thirst for His righteousness, He fills us with peace and joy that nothing else can give. As a follower of Christ, especially on the Sabbath, I see this as a time to rest in God and fill my spirit with His word. Instead of focusing on what the world offers, we should focus on God’s truth and love. When we seek Him first, we will be truly filled and blessed in every part of our lives.

    in reply to: OCU C)SP D Week 05 Lesson 10 Discussion #110946
    Mjulius513
    Participant

    I agree with your post because you explained the main risks companies face today very clearly. Cyber threats like phishing and ransomware can hurt businesses fast, especially if employees aren’t trained. I like how you mentioned layered security and regular updates—those are very important. Training workers and having backups really help keep data safe and secure.

    in reply to: OCU C)SP D Week 05 Lesson 11 Discussion #110898
    Mjulius513
    Participant

    I think having strong policies is the best way to keep a company safe. One important policy is Access Control, which means only the right people can use certain systems or data. Another is Password Policy, which makes everyone use strong passwords and multi-factor authentication (MFA) to stop hackers.

    A Data Protection Policy helps keep private information safe and follows privacy laws. The Incident Response Policy is also very important because it tells what to do if there’s a security problem, like a data breach or attack. It helps the company fix issues fast and avoid more damage.

    Security Training Policy is key. When workers learn how to spot scams and phishing emails, they help keep the company safe. Together, these policies create a strong security program that protects data, builds trust, and keeps the company prepared for future threats and challenges in the digital world.

Viewing 15 posts - 31 through 45 (of 127 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.