SCADA, the Vulnerabilities and Mitigating the Risks

SCADA is an abbreviation for Supervisory Control and Data Acquisition. It is a group of connected technologies that usually control a system of infrastructure. There are several significant vulnerabilities that the SCADA system has. With every issue that comes up, there are also ways to fix and alleviate these problems. Vulnerabilities According to the SCADA…

Chief Information Security Officer

A Chief Information Security Officer has many responsibilities and decisions to make. They need to decide what type of training and technology the company needs to have an effective cybersecurity department. With the budget they have they need to make sure the correct amount of the limited resources goes to each in an appropriate manner….

CIA Triad and Authentication & Authorization

The CIA Triad is made up of three parts. They are confidentiality, integrity, and availability. There is a difference between authentication and authorization. Authentication is who and authorization is what. CIA Triad The CIA Triad is a way that cyber security is used in different organizations (What Is the CIA Triad? Definition, Explanation, Examples ,…