Posts

Showing posts from August, 2025

Week 10 - Troubleshooting

Image
In our final week, I learned different tools to help troubleshoot our systems and networks. Troubleshooting is the best way to solve security issues in our systems and networks, and there are various tools to help prevent the problem. Troubleshooting is used to identify the issue and then find the solution. Issues like malware or network congestion are always on the rise, so understanding the troubleshooting processes will help solve these issues. This is the final week, and the blog for Cybersecurity VS Cyberattacks is ending. I talked about different ways to harden our systems and resolve network issues each week. These steps help keep security up to date in our devices, and along the way, I learned newer ways of keeping our systems and networks secure. Our data is necessary, and with it being important, it's our job to keep it away from cybercriminals. Each tool, method, and procedure helps our systems become more secure and our networks send our data safely.

Week 9 - Incident Response

Image
In week 9, we learned about incident responses, which document the aftermath of a threat. After an attack, it's essential to start an incident response, which helps prevent future risks from happening to the system. It's always important to document the ongoings of the incident, but making up a plan after the attack is critical in understanding what to do if it happens again. Incident response is an essential procedure for both small and large businesses. Attacks can happen at any point, and if not taken seriously, could lead to some harsh consequences. So, starting any documentation is essential to save the business from damage. An incident response will help conclude the attack by understanding what happened and how it was resolved.