Critical Infrastructure systems such as waste and water management, power plants, electricity and transportation are foundational to our society. However, with the development and reliance on technology, has made them a growing target of cyberattacks. These offenses can cause irreparable and long-lasting damages if their vulnerabilities were to be exploited. Supervisory Control and Data Acquisition…
Author: tmorg022
The CIA Triad
The CIA triad – Confidentiality, Integrity, and Availability – is a foundational model used within Information security that acts as a guide to create security systems or methods. Authentication and Authorization are important components of this foundation. With authentication ensuring that only verified users can access systems and authorization, they only access resources they need…
Human Factors in Cybersecurity
With a limited budget, chief information security officers (CISO), can balance both the technical and social side of cybersecurity. The focus of cybersecurity methods and practices relies primarily on the technological and digital features within the field. In turn, this leads to a neglect on the social human-side where most of the vulnerabilities occur. With…