Soumya

Soumya

SOC2 Compliance for Startups

SOC 2 FOR SERVICE ORGANISATIONS SOC for Service Organizations reports are designed to help service organizations that provide services to other entities, build trust and confidence in the service performed and controls related to the services through a report. Each…

Fundamentals Of Security Headers

The notorious targets for all sorts of cyber attacks can be zeroed down to the web applications. The increasing pattern of cyber attacks has led us, to not just inculcate cyber security as a luxury, rather as a necessity for…

Fundamentals Of SCADA Security – 4

Security threats to SCADA and RTU The SCADA systems which tie up together the decentralized facilities like; oil and gas pipelines, waste water collection, power and water distribution systems were actually designed so as to be robust, open and to…

Fundamentals Of SCADA Security – 3

Introduction to RTU The remote terminal unit abbreviated as RTU is an electronic device that is controlled through the use of a microprocessor. It helps interface the objects that are present in the physical world to a SCADA system by…

Fundamentals Of SCADA Security – 2

Introduction to PLC Programmable logic controllers abbreviated as PLC are said to be industrial computers that help monitor inputs, make relevant decisions on the basis of their programs and thereby control outputs so as to automate processes or machines. It…

Fundamentals Of SCADA Security – 1

Introduction to SCADA Supervisory Control and Data Acquisition abbreviated as SCADA is regarded as a complete system constituting of hardware and software components that helps allow industrial organizations to have control over the industrial processes either locally or at remote…