article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 2: A list of incidents in the water industry (Ten, Liu & Manimaran, 2008) What I think is interesting about the list above is the details of who conducted the attack. Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 2: A list of incidents in the water industry (Ten, Liu & Manimaran, 2008). Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. These links can be intercepted and are vulnerable to attack. Bibliography.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Haiti: has there been progress in disaster reduction since the last big earthquake?

Emergency Planning

In 1978 the architect Ian Davis published a small book entitled Shelter After Disaster , [iv] which included a number of well-chosen exposés of post-disaster housing as architectural fantasy rather than useful dwelling place. For example, in the 2008 hurricane season, four named storms arrived.

article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

Vulnerability Vigilance: Regularly scan your APIs for vulnerabilities and patch them promptly. These steps allow organizations to build a robust data privacy ecosystem where APIs become guardians, not vulnerabilities. A risk assessment shows organizations what their architecture looks like, their vulnerabilities, and more.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

Vulnerability Vigilance: Regularly scan your APIs for vulnerabilities and patch them promptly. These steps allow organizations to build a robust data privacy ecosystem where APIs become guardians, not vulnerabilities. A risk assessment shows organizations what their architecture looks like, their vulnerabilities, and more.