Remove 2015 Remove Architecture Remove Vulnerability
article thumbnail

Reflections on the Turkish-Syrian Earthquakes of 6th February 2023: Building Collapse and its Consequences

Emergency Planning

It is a mixture of simple errors, lax procedures, ignorance, deliberate evasion, indifference to public safety, untenable architectural fashions, corruption and failure to enforce the codes. Most of them are highly vulnerable to seismic forces. It is these that collapse. Natural Hazards and Earth System Sciences 15: 931-945.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. Remote Access – As systems are often widely dispersed, remote access is more vulnerable to unauthorised access. Architecture and security of SCADA systems: A review.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. Remote Access – As systems are often widely dispersed, remote access is more vulnerable to unauthorised access. Architecture and security of SCADA systems: A review.

article thumbnail

Haiti: has there been progress in disaster reduction since the last big earthquake?

Emergency Planning

In 1978 the architect Ian Davis published a small book entitled Shelter After Disaster , [iv] which included a number of well-chosen exposés of post-disaster housing as architectural fantasy rather than useful dwelling place. Nowhere more than in Haiti has disaster been made inevitable by the nexus of poverty and vulnerability.

article thumbnail

SIA New Member Profile: Incode

Security Industry Association

Ricardo Amper : I founded Incode Technologies in 2015 along with a group of hard-working, goal-crushing individuals. Today’s barriers of clunky identity experiences, privacy gaps, vulnerability-laden technologies and higher costs will cease to exist once trust is marginalized. Tell us the story of your company.