Remove 2015 Remove Architecture Remove Security Remove Vulnerability
article thumbnail

Haiti: has there been progress in disaster reduction since the last big earthquake?

Emergency Planning

In 1978 the architect Ian Davis published a small book entitled Shelter After Disaster , [iv] which included a number of well-chosen exposés of post-disaster housing as architectural fantasy rather than useful dwelling place. In Haiti, a third of the population lacks secure access to food. Krimgold (eds) 2015. v] Davis, I.,

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Physical Security – Some systems may be secure within the plant. Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. These links can be intercepted and are vulnerable to attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Physical Security – Some systems may be secure within the plant. Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. These links can be intercepted and are vulnerable to attack.

article thumbnail

SIA New Member Profile: Incode

Security Industry Association

New Security Industry Association (SIA) member Incode is a leader in privacy-centric identity verification for global enterprises. SIA spoke with Ricardo Amper, founder and CEO of Incode, about the company’s history and offerings, the security industry and working with SIA. Tell us the story of your company.