The NIST Cybersecurity Framework contains guidelines, standards, and practices to manage cybersecurity risk. Using this framework will bring multiple benefits to your organization. It is something that is easily adaptable and can be tailored to meet your organizations needs. The framework can be used to identify areas in a system that could be strengthened or…
SCADA Systems
Critical Infrastructure systems are associated with several threats and vulnerabilities. Thethreats can be classified into three categories: natural phenomena, technical hitches and humanerrors. These threats are likely to be amplified by key vulnerabilities. For example, one of the keyvulnerabilities to critical infrastructure is geographical location. In most cases, these infrastructuresare concentrated in on location. In…
The CIA Triad
There are three primary concepts of information security: confidentiality, integrity, and availability. This is known as the CIA triad. Thismodel is used to guide organizations attempt to keep their information anddata secure. Confidentiality is similar to privacy but is not the same. It refers to the abilityto protect data from those who are not authorized…