BLUFIn the United States, SCADA is used on a regular basis to ensure that our key pieces of infrastructure are safe and operational. What is SCADA? In the technological realm, SCADA generally refers to supervisory control and data acquisition. This is the technical jargon for being the portal of the infrastructure that detects and analyzes…
The Triad & Authentication
BLUFThe importance of the CIA Triad (confidentiality, integrity, and availability) and the key differences between authentication and authorization. CIA Triad In the cybersecurity field a good model to use to ensure best practice is the confidentiality, integrity, and availability triad. These ensure that your systems will not be compromised and that appropriate employees will be…
Exploring Exploits
BLUFIn cybersecurity we have the key role to ensure that the exploits are limited and the attacks are neutralized. What is Attacks on Availability? Attack on availability is any ransom attack that would hinder a server’s ability to remain functioning as normal. These attacks often include ransomware, malware, disrupted denial of service (DDOS), and some…