Posts

Showing posts from June, 2025

Week 4 Reyna Layered Security

  The Importance of Layered Security as a Countermeasure One key countermeasure against modern security threats is implementing a layered security strategy , often referred to as defense-in-depth. This approach involves deploying multiple levels of defense mechanisms—such as firewalls, intrusion detection systems (IDS), endpoint protection, and strict access controls—to protect against different types of attacks. The logic behind this is that if one layer fails, others remain active to provide protection. For instance, even if a phishing email bypasses a spam filter, multi-factor authentication (MFA) can prevent unauthorized access. Organizations benefit from this redundancy because cyber threats often evolve quickly, and no single tool can offer complete protection. Layered security also buys valuable time to detect and respond to breaches before significant damage occurs. While technology plays a critical role in cybersecurity, employee training and awareness are essential cou...

week 3 reyna cloud computing

 This week’s content highlighted the growing reliance on cloud computing, especially in the wake of the COVID-19 pandemic, which drastically increased the need for secure remote access to corporate networks. While cloud migration offers scalability and convenience, it also expands the attack surface, introducing new vulnerabilities across software, infrastructure, and endpoints. One key takeaway is that organizations must adopt a proactive approach to cloud security—implementing regular vulnerability assessments, patch management, and compliance monitoring to defend against evolving threats. Chapters 5 through 7 of the CompTIA CySA+ guide emphasize the importance of vulnerability scanning tools and risk assessments to maintain a strong security posture. Tools like Nessus, OpenVAS, and Qualys can help detect misconfigurations, outdated software, and unpatched systems in cloud and hybrid environments. These tools are not just beneficial—they are essential in identifying weaknesses b...

week 2 reyna vulnerability management and threat intelligence

let's take a deep dive into critical aspects of cybersecurity analysis, focusing on vulnerability management and threat intelligence. One insight that stood out is the importance of a proactive vulnerability management process. The book emphasizes that identifying and prioritizing vulnerabilities is not a one-time task but a continuous cycle that integrates scanning, assessment, remediation, and reporting. This approach ensures organizations stay ahead of emerging threats rather than reacting after an incident occurs. What’s particularly interesting is how the prioritization of vulnerabilities should be aligned with the organization's risk tolerance and asset criticality—not every vulnerability warrants the same level of urgency. Another key takeaway is the evolving role of threat intelligence. Chapter 4 expands on how collecting, analyzing, and sharing threat intelligence data can empower cybersecurity teams to anticipate attacker behavior. The guide highlights different typ...

week 1 reyna

My name is Johnny Reyna, and I’m excited to step into the IT blogging world as I continue my journey toward a degree in Information Technology. This space will be my platform to reflect on what I’m learning, share insights, and hopefully spark meaningful conversations with others passionate about the world of cybersecurity and networking. This term, I’m diving into the topic of System Hardening and Network Risk Management —a critical area in today’s digital landscape. With cyber threats becoming more sophisticated and widespread, understanding how to reduce vulnerabilities and protect systems is more important than ever. Although I’m still growing my experience in this area, I understand that system hardening involves securing systems by reducing their attack surface—removing unnecessary software, disabling unneeded services, applying patches, and configuring system settings properly. It’s all about making it harder for attackers to exploit weaknesses. On the other hand, network risk ...