How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine
Industrial Control System (ICS)/SCADA System is widely adopted in manufacturing, energy and utilities, chemical and petroleum industries for mission critical industrial automation. For quick key term definition. Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include production line management, mining operations control,
As organizations gear up for web applications or various application that make use of RDMS backend database. Database Availability become a issue that will contribute for application availability, security and performance. This round let look into area that always no so well reports, i.e. database house keeping and why you need to do it often