A SCADA (Supervisory Control and Data Acquisition) system acts as a hub for multiple sources of infrastructure data. SCADA systems can also coordinate multiple processes in real time. These processes can include things such as wastewater treatment, manufacturing, gas pipelines, or wind turbines. Infrastructure Vulnerabilities Critical systems face threats every day. Earlier this year a…
Author: rvazq001
Attacks on Availability
An attack on availability can describe an event that prevents users who have authority to access data from being able to access that data. The most common way this can happen is via DDoS (Distributed Denial of Service) attack. There are many different variations of DDoS attacks but they all accomplish the same goal by…
The CIA Triad
The CIA Triad (sometimes called the AIC triad) model is intended to be a guideline for information security policy in an organization. The triad’s three key concepts are confidentiality, integrity, and availability. ConfidentialityThe confidentiality concept can be compared to privacy. The more sensitive a piece of data is the more damage can be done by…