Introduction Threat actors are always working full time to try to break into secure systems. Whether it’s taking advantage of weak security practices, holes within the system or human error, organizations must ensure that they find a good balance to prevent major losses. This balance is difficult to achieve as technology grows with each day….
Complex Critical Infrastructure and SCADA Risk
Introduction Critical Infrastructure systems are the backbone to modern society but are the most at risk for cyber-attacks. These systems are vulnerable due to their growing complexity and reliance on a connected network. The Supervisory Control and Data Acquisition system, SCADA, is used to control, monitor and analyze industrial devices and processes (1). These systems include…
Authentication & Authorization within the CIA Triad
Introduction The CIA Triad model is a measure used by organizations to effectively manage and safeguard sensitive information. The model is made up of three components; confidentiality, integrity, and availability. While each concept has its own importance, together, the three make up major cybersecurity standards and values. Authentication and Authorization exist within the framework of…