Mitigating Vulnerabilities in Critical Infrastructure Systems with SCADA ApplicationsCritical infrastructure systems are at risk of cyber-attacks, which can have disastrousconsequences. SCADA (Supervisory Control and Data Acquisition) applications play a vital rolein mitigating these risks by providing real-time monitoring and control of industrial processes.Headings:1 Introduction2 Vulnerabilities in Critical Infrastructure Systems3 Role of SCADA Applications in Mitigating…
DISCUSSION BOARD: Protecting Availability
To ensure availability of our systems, I would implemented protections such as redundancies, backups, and proper maintenance. //grammar error: implemented –> implement . One key element of redundancies is having multiple servers located in different geographical locations so that if one is affected by a natural disaster or power outage, the other servers can still…
The CIA Triad
Summary: This article discusses the CIA triad, which is a model designed to guide organizationsin managing their security. It also explains the differences between authentication andauthorization as well as provides an example of each.The CIA TriadThe CIA triad is a security model designed to help organizations protect their information. Itoutlines the three core components of…
About me
My name is Jermarion Tillman, to get around most of my work. I’m currently in college, studying cyber security and computer science. I’m still learning a lot of coding languages, such as C++, Python and Java. I’m also learning a lot of networking and security protocols. I’m also taking a class on cybercrime, which is…