Human Factor in Cybersecurity Write Up

Threats & motives:Some common threats that humans contribute to consist of hacking, phishing, malicioussoftware, etc. Those who engage in these threats either have the motive of defacement whereit is politically motivated, or Denial of Service where it could be either political or economic.Most who commit these threats sometimes have little to no knowledge & technical…

SCADA Systems Write UP

SCADA Also known as supervisory control and data acquisition, it refers to the ICS betterknown as the industrial Control systems. It is used to control infrastructure processes like,water treatments, traffic lights, gas pipelines, and wind farms.SCADA Systems Concepts:It refers to the centralized systems that control and the monitor entire sites, or thecomplex systems spread over…

The CIA Triad Write-Up

The CIA triad is a designed model that guides policies for information security within anorganization. CIA stands for Confidentiality, Integrity, and Availability. Confidentiality limitsaccess to Information by it authorized users. Integrity assures that the information istrustworthy or accurate. And Availability guarantees access to information by authorized users.Authentication and Authorization are both very important and are…