The CIA triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure. There are three principles on which infosec rest and they are confidentiality, integrity, and availability. Confidentiality is about how only authorized users and processes should be able to access or modify…
SCADA Systems
In a nutshell, SCADA systems are industrial control systems (ICS) that specifically provide supervisory-level control over machinery and/or industrial processes that span a wide geographical area (such as energy distribution plants). SCADA systems contain Supervisory Computers as well as many other devices, chief of which are Programmable Logic Controllers (PLCs) and Remote Transmission Units (RTUs)….
Opportunities for Workplace Deviance
Cyber technology has created new opportunities because it is much harder to find the person when they are doing the harmful acts behind a computer compared to when they are in person and can be caught. Digital innovation has set out new open doors since it is a lot harder to discover the individual when…