Jason Exume Attacks that disrupt availability Bluf There are several types of cyber-attacks that target the availability of systems. These can include DDOS attacks, Phishing Attacks, and logic bombs. There are several more but for now I’ll just focus on these 3. The listed cyber-attacks can all have a devastating effect on an organization, including…
Author: bexum001
Hacking Humans
Jason Exume Hacking Humans Something I realized is having DNA data stolen and digitalized is not spoken about often, and to be honest the thought hasn’t crossed my mind until reading the “Hacking Humans” article. While having your social security number, or bank info stolen is a serious and critical issue, you can have that…
Getting To Know the SCADA System
Jason Exume Getting To Know the SCADA System Bluf There are a number of vulnerabilities associated with critical infrastructure systems. Some systems harbor assets, networks, and critical data both physical and digital that could be vital to the U.S. Some systems are so sensitive that they could even bring a devastating shock to National security….
Getting to know the CIA Triad, and understanding Authentication & Authorization
Jason Exume Getting to know the CIA Triad, and understanding Authentication & Authorization Bluff The CIA or AIC is a very reliable model that focuses on the 3 most essential concepts within information security.” Its purpose is to guide policies for information security within an organization” (Wesley Chai 2025) and should be a part of…