Security threats to SCADA and RTU The SCADA systems which tie up together the decentralized facilities like; oil and gas pipelines, waste water collection, power…
Year: 2020
Fundamentals Of SCADA Security – 3
Introduction to RTU The remote terminal unit abbreviated as RTU is an electronic device that is controlled through the use of a microprocessor. It helps…
Fundamentals Of SCADA Security – 2
Introduction to PLC Programmable logic controllers abbreviated as PLC are said to be industrial computers that help monitor inputs, make relevant decisions on the basis…
Fundamentals Of SCADA Security – 1
Introduction to SCADA Supervisory Control and Data Acquisition abbreviated as SCADA is regarded as a complete system constituting of hardware and software components that helps…
Firewall Policies Compliance
RCIE Course Modules: 3.8 Firewall Policies Compliance Firewall Policies compliance Having a strong firewall policy allows companies to stay compliant to best practices. From a…
Ethical Hacking Information Gathering
INFORMATION GATHERING ( REDHAWK ) USING KALI Basic Reconnaisance: GEO-IP LOOKING GRAB BANNERS: DNS LOOKUP: SUBNET CALCULATOR: NMAP PORT SCANNING: SUBDOMAIN:
Data Hacks and breaches – how big companies have lost trust and what can they do to protect customers
Data hacks are the number 1 concern in the minds of consumers right now. They lack trust in these large organizations, and don’t want to…