An attack on availability is a security breach that its sole purpose is to reduce reliability, accessibility, or the performance of data. The different types of attacks on availability includes Denial of Service (DoS), malware, ransomware. DoS floods a network or system making it hard to access by legitimate users. When this happens, it causes…
SCADA Systems
Any type of security–based systems is subjective to being targeted. SCADA is noexception. SCADA is supervisory control and data acquisition. According to the SCADASystems article, it “refers to ICS (Industrial control systems) used to control infrastructureprocesses, facility–based processes, or industrial processes”. SCADA systems allow usersto make informative decisions to make sure the infrastructure and operations…
The CIA Triad
The CIA triad, which is also known as confidentiality, integrity, and availability, isconsidered one of the most integral concepts in cyber security. It helps guide policies forinformation security in organizations. It’s essentially a way to keep important informationsafe. Authentication and authorization are very important to the CIA Triad. Authenticationallows systems to verify a user is…