Mile2 Cybersecurity Institute

Trae Johnson

Forum Replies Created

Viewing 15 posts - 61 through 75 (of 158 total)
  • Author
    Posts
  • in reply to: OCU C)SP D Week 03 Lesson 06 Discussion #109717
    Trae Johnson
    Participant

    There are multiple types of data storage facilities, and all serve different needs depending on the amount of data, how accessible it should be, and how much protection is required. Primary storage, such as hard disk drives (HDDs) and solid-state drives (SSDs), is the most common type and is used for operating systems, software, and working data. SSDs are faster and more reliable compared to HDDs as they lack moving parts, and hence are ideal for modern computers and servers that demand fast data access.

    Secondary storage, which includes external drives, USB flash drives, and optical discs. They are typically relegated to backups or file transfer between systems. Cloud storage has also become popular, with scalability and remote access via the likes of Google Drive, OneDrive, and Amazon S3. Businesses use the cloud to store large amounts of data while minimizing the necessity for on-premise infrastructure.

    Storage area networks (SANs) and network-attached storage (NAS) are used by organizations requiring shared access and centralized data management. NAS is great for file sharing over a local area network, whereas SANs tend to be utilized in enterprise environments for high-speed block-level storage. All these forms of storage are crucial to ensuring data availability, protection, and efficiency both at home and in the workplace.

    in reply to: OCU C)SP D Week 03 Devotion #109716
    Trae Johnson
    Participant

    Matthew 3 really struck a chord with me because I myself have wrestled with periods of self-righteousness, periods when I felt like I was “doing enough” to please God by my own efforts. As the Pharisees and Sadducees, I have sometimes comforted myself by measuring myself against others instead of checking myself within. But God has a way of humbling us and reminding us that fruit that is good does not come from the work of humans, but from a heart that repents and trusts completely in Him.

    I have found that when I stop trying to control and really let go in surrender to Christ, then true transformation is possible. Fruit in my life, patience, humility, and compassion, only emerge when I am planted in God and not pride or habit. This verse reminds me daily that true faith is not being seen as righteous; it is God working from the inside out to shape me.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109610
    Trae Johnson
    Participant

    The year 2020 was a huge wake-up call for cybersecurity. I remember how quickly remote work exposed poor passwords, unsafe Wi-Fi, and phishing attacks. It revealed how ill-prepared the majority of organizations were for an overnight transition. Since then, I have seen increased focus on VPNs, two-factor authentication, and employee training, which has been a giant improvement. That year demonstrated that cybersecurity is not an option but instead, it’s a must to safeguard individuals and businesses.

    in reply to: OCU C)SP D Week 02 Devotion #109454
    Trae Johnson
    Participant

    Reading Matthew 2 and the prophecies of Christ, I am impressed at how specific and detailed the Bible is about the coming of Jesus. The prophecy in Micah about the Messiah to be born in Bethlehem speaks deeply to me, not as history, but as a personal reminder of God’s plan and promise. Thinking about how this little, far off village was specifically chosen from all the places in the world makes me realize the consideration and forethought that God put into His actions. It blows my mind that these prophecies were written hundreds if not thousands of years prior to Jesus’ birth, but every fact was accounted for. This has made me reflect on the reliability of Scripture in a way that goes beyond just reading—it feels like God is speaking directly into history and into my life.

    Beyond His birthplace, I’ve also been struck by the many other messianic prophecies in the Old Testament, from His lineage to the manner of His death. To watch how each of them fit into the life of Jesus causes me to understand in wonder and reassurance that God’s Word is true. To experience them firsthand myself made my own faith stronger and reminds me that God’s Word is not random or by chance. It encourages me daily to hear, believe, and respond to His Word, knowing that His plan had been in process way before I was even conceived.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109453
    Trae Johnson
    Participant

    In 2020, cyberattacks rose exponentially as organizations coped with the unprecedented remote work shift amid the COVID-19 pandemic. Organizations were struggling to secure home networks, remote endpoints, and cloud infrastructure, while phishing, data breaches, and ransomware attacks surged. Misconfigured clouds, inadequate identity management, and third-party risks also presented significant threats. At the same time, cybercriminals exploited fear and confusion through COVID-titled scams and social engineering, revealing the extent to which many organizations were not prepared for such a mass-scale digital transformation.

    Businesses spent more on cybersecurity technology, automation, and staff education training. Most adopted stronger identity and access management controls, such as multi-factor authentication and least privilege guidelines, to limit damage from a compromised account. Organizations improved patch management, cloud settings were locked down, and vendor control was strengthened to cut supply chain risk. Compliance practices accelerated as privacy law like GDPR gathered momentum, forcing companies to concentrate on information safeguarding and disclosure.

    These responses highlighted a few key lessons: security is as much about people and processes as it is about technology, and visibility across systems is required to mitigate risk. The actions taken in 2020 shifted organizations in the direction of the “zero trust” mindset, with ongoing verification, least privilege, and offense-in-depth to future-proof against threats.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109452
    Trae Johnson
    Participant

    That is a good definition of the “Fail Securely” principle. I agree that the way an error is processed by a system can be the difference between staying secure and leaking sensitive data. Your example of a detailed error message is just correct—revealing technical details gives attackers exactly what they need to mount an attack. Designing systems to deny access and protect data in case of failure keeps even unwanted issues from generating security intrusions. It’s a simple but efficient principle that reiterates the importance of anticipating failure in all secure system design.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109419
    Trae Johnson
    Participant

    Among the top 10 OWASP security principles that are significant controls is “**Least Privilege.**” This control avoids users, systems, and programs from having more than they need in order to perform their tasks. Limiting privileges reduces the likelihood of unauthorized access, accidental usage, and exploitation by attackers. For instance, if an attacker takes over a low-level user account, the impact will be low because the account is not an admin account. If there is no such principle governing, one vulnerability might expose a whole system. Least privilege usage also imposes responsibility and enhances overall security posture. Least privilege is a key control that not only safeguards against internal and external attacks but also helps comply with data protection law.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109418
    Trae Johnson
    Participant

    I would agree that mobile phones have turned indispensable and perilous. With the evolution of AI-powered scams and round-the-clock data harvesting, digital vigilance is more important than ever. Apart from cybersecurity, the psychological and social impacts of excessive use underscore the necessity of boundaries. With responsible use, we can harness the utility of technology without compromising privacy or well-being.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109417
    Trae Johnson
    Participant

    This is clearly outlined how various threats, from data leakage to phishing and malware, can impact users’ security and privacy. I agree that unsecured networks, outdated software, and excessive app permissions all increase vulnerability. As mobile devices become more connected to other systems, protecting them with updates, strong passwords, and encryption is essential to prevent serious harm.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109329
    Trae Johnson
    Participant

    Some of the dangers that mobile phones presented in 2022 were malware, phishing, data breaches, and unsecured app permissions. Mobile malware was still increasing, typically hidden in seemingly harmless apps purchased from unauthorized app stores. Installed, the harmful codes had the ability to snatch away user details, track location data, or even take over the device. Phishing was also on the rise, with perpetrators using text messages and fake login pages to trick users into entering sensitive information such as passwords or bank details. Public Wi-Fi networks also posed security threats by allowing data interception by attackers, thus potential identity theft or unauthorized access. Poor app permission management was the second concern. Many apps requested access to microphones, images, or contacts unnecessarily, boosting privacy risks. Finally, outdated operating systems or refusal to update to plug holes for security vulnerabilities exposed other devices to exploits and ransomware. Users must minimize these threats by downloading apps from their original providers, updating devices, using strong passwords and two-factor authentication, and avoiding sharing sensitive data over non-secure networks.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109328
    Trae Johnson
    Participant

    I wholeheartedly agree that well-delineated, clear-cut policies ensure rapid and coordinated reactions to incidents. Each policy, from detection all the way up to recovery and audit, ensures stability as well as accountability. Via these policies, an organization can respond successfully, contain damage, and improve its security position continuously.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109327
    Trae Johnson
    Participant

    I would agree that it is concise policies which are the foundation of an effective incident response program. Establishing roles, communication protocols, handling of data practices, and training ensures coordinated and confident action. These actions not only reduce confusion during emergencies but also increase the overall security and resilience of an organization.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109326
    Trae Johnson
    Participant

    I agree that third-party audits and industry compliance enhance transparency, credibility, and security of a business via an unbiased evaluation. In the same way, industry compliance guarantees consistency, legal safeguarding, and reputation improvement. Together, they create a culture of accountability and continuous improvement that supports long-term success.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109325
    Trae Johnson
    Participant

    I agree third-party audit ensures positive objectivity, compliance, and trust among stakeholders. Though time- and resource-consuming, the ultimate dividends of long-term credibility, security, and efficiency make it worth the investment.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109245
    Trae Johnson
    Participant

    A successful incident response is dependent on well-documented policies that provide guidance and specificity at the time of crisis. A well-crafted incident response plan (IRP) should delineate roles, responsibilities, and escalation practices so that each individual—executives to IT staff—knows their part. Incident classification guidelines to identify priorities for response, and logging and monitoring requirements to enable suspicious behavior to be easily identified and investigated, should be encompassed within policies. A data retention and handling of evidence policy is also imperative in a bid to preserve digital evidence for legal or forensic purposes.

    Organizations need good communication and training policies. A communications policy has to determine when and how occurrences are reported within the company, when the customers or regulators are notified, and how sensitive data is handled to prevent panic or liability. Regular training and simulation exercises prepare employees to react effectively to real threats like ransomware or phishing. Finally, a post-incident review policy takes responsibility in making workers accountable for learning from the incident, plugging gaps, and making defenses stronger in the future. Together, these policies make response efforts less chaotic and more an effective defense against cyber threats.

Viewing 15 posts - 61 through 75 (of 158 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.