Posts

Showing posts from July, 2025

BSIT400 - T301 Week 8

The analysis of cloud storage this week revealed multiple essential elements that determine the appropriate cloud storage solution. The selection of cloud storage depends on three main factors, which include storage capacity requirements and data accessibility needs, data importance levels, and data structure needs. File system storage functions properly for team document sharing, yet fails to handle extensive unstructured data at scale. Object storage stands out as the best solution because it provides scalability features along with built-in metadata and REST API support. The presentation showed that backup strategies operate differently within cloud environments. It explained that durability stands apart from backup methods because organizations must protect their data through full incremental and differential backup approaches. The 3-2-1 and 4-2-3 rules provided essential guidance for organizations to protect their critical information. The module delivered valuable insights about ...

BSIT380-T302 Week 8 Blog

T he essential role of automation and continuous monitoring in enhancing cybersecurity posture was the main topics in this week's reading. The tools SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response), according to Chapter 14, help organizations streamline their threat detection and incident response processes. The tools stand out because they improve operational efficiency and decrease human mistakes particularly during intense security incidents. The fast pace of threat evolution makes manual security processes no longer sufficient for protecting against modern cyber threats. The main lesson shows that automation serves to strengthen human analysts rather than replace them. These systems enable cybersecurity teams to concentrate on advanced threats and strategic defense planning by eliminating false positives and performing regular tasks. The future of cybersecurity requires advanced technology to work in harmony with skill...

BSIT400 - T301 Week 7 Blog

The emphasis on Identity and Access Management (IAM) this week demonstrates its essential role for achieving successful cloud deployment. The transition from perimeter-based security to identity-centric security within hybrid cloud environments became a key concept that caught my attention. The need to verify user identities has surpassed location-based verification because users now access services through various devices and locations. The implementation of Multi-Factor Authentication (MFA) together with certificate-based login and federated identities has become essential for modern security standards. I also gained a deeper appreciation for account lifecycle management. The process of creating accounts requires ongoing access reviews, user deactivation, and prevention of escalating privileges. The IAM features of AWS, Azure and GCP are extensive, but administrators must implement best practices including least privilege access and enforce robust password requirements. Organizations...

BSIT380-T302 Week 7 Blog

 This week’s content from Chapter 13 of the CompTIA CySA+ Cybersecurity Analyst Certification All-In-One Guide focused on the critical topic of incident response and recovery , a core component of cybersecurity operations.  Organizations need to shift away from reactive approaches by implementing structured incident response plans (IRPs) which consist of preparation, detection, containment, eradication, recovery, and lessons learned. The incident response phases enable organizations to respond quickly to security incidents while identifying and fixing the root causes to stop future occurrences. The importance of documentation and communication stands out to me because these elements don't receive a whole lot of information. Organizations need to establish clear reporting channels, define team roles, and conduct post-incident analysis to build a stronger security posture. The chapter confirms that organizations need both proper tools, trained personnel, and established respons...

BSIT380 - T302 Week 6 Blog

This week’s chapters, 11 & 12, focused on detecting cyber threats through the analysis of system-collected data. The collection of logs and alerts is not good enough because organizations need to establish network baseline data to identify any abnormal activities. Security Information and Event Management (SIEM) and packet sniffers enable system monitoring, but users must conduct thorough analysis to determine important information.  Chapter 12 shows how threat intelligence enables organizations to anticipate hacker activities. The process of threat identification relies on analyzing unusual files and login patterns to determine the nature of the threat. The approach involves both attack reaction and proactive threat preparation through the analysis of trends and cybercriminals' operational patterns. The main lesson from this week was that data collection becomes effective only when organizations understand how to interpret and defend their systems with the gathered information...

BSIT400 - T301 Week 6 Blog

  This week's reading and PowerPoint showed how complex it is to protect cloud environments. The shared responsibility model stands out as a key concept because it shows that CSPs protect infrastructure but customers must protect their data, identities, and configure their systems properly. The distinction between cloud security responsibilities becomes essential when dealing with shadow IT, inside misuse, and misconfigured services. The concept of defense-in-depth in cloud environments also seemed as a big piece of this weeks studies. Organizations need to implement multiple security controls which extend from networks to instances and data to achieve proper protections. Organizations can protect their workloads through microsegmentation and DevSecOps by implementing these techniques during the development stages. The standardization of cloud security through CASBs and cloud-native firewalls enables unified policy enforcement and visibility across AWS, Azure, and GCP platforms in ...

BSIT380-T302 Week 5 Blog

The main lesson from this week's material showed that cybersecurity requires both knowledge and readiness to execute actions swiftly and effectively. The importance of preparation stood out most to me in Chapter 9 because it stressed the need for creating incident response tools before incidents occur. The pre-built incident response toolkit consists of more than software because it includes strategic resources, which include forensic tools together with log collectors, and hardware for secure analysis environments. A team with excellent training becomes ineffective when time becomes critical because they lack this essential resource. The decisions made during an incident either help to contain threats or unintentionally make them worse, from what I learned in Chapter 10. The chapter talked about how organizations should evaluate incident severity while determining notification procedures and selecting between complete containment and targeted isolation methods. A well-prepared res...

BSIT400-T301 Week 5 Blog

This week's emphasis was on hybrid and multi-cloud networking, showing how modern cloud systems require complex infrastructure designs that need secure and resilient connections. The use of VPNs and direct connections was also a key concept during this week's reading and PowerPoint presentation. VPNs provide affordable encryption solutions for public networks which suits the requirements of small-scale operations and remote access needs. Enterprises handling large volumes of traffic and latency-dependent workloads should use AWS Direct Connect or Azure ExpressRoute through multiple location facilities because these services deliver reliable, high-performance connections. The direct options provide organizations with superior control over bandwidth and availability. The main lesson from this week was the difference between VLANs and VXLANs. The scalability of VLANs is limited because they function as traffic segmentation tools for security and efficiency purposes. VXLANs solve t...