IT and ICS Security Assurance

Consultant | Training | Solutions
Fedco International, PT.

Welcome to Fedco - IT and ICS Security Consultant

Industrial Control System Reference Model – IEC 62443

  • Posted by fedco
  • On January 30, 2015
  • 0 Comments
  • ics security reference, ics security reference model, ics security standard, iec 62443
The term of reference model became popular in IT world since the introduction of Open Systems Interconnection (OSI) model. The OSI model split the layers of communication into 7 layers. A couple of time after the introduction of OSI model, the Transport Control Protocol/Internet Protocol (TCP/IP) model also introduced to the public with the more […]
Read More
 

Industrial Control System Security Vulnerabilities

  • Posted by fedco
  • On January 30, 2015
  • 0 Comments
  • ics security, ics security solutions, ics security training, ics security vulnerabilities
The security assurance of Industrial Control System environment should be considered as one of the priority due to its critical function in the critical industry sector. The vulnerabilities of the ICS environment should be identified in order to implement the proper strategic action to control the risk into the ALARP level. This short article explain […]
Read More
 

Di Tengah Persaingan Produsen Minyak Dunia

  • Posted by fedco
  • On January 29, 2015
  • 0 Comments
  • fluktuasi harga minyak dunia, harga minyak turun, produsen minyak bumi, shale oil
Tahukah kita bahwa dunia dalam beberapa bulan ini sedang mengalami penurunan harga minyak mentah dunia, yang tadinya berkisar di atas $110/barel sekarang turun menjadi di bawah $50/barel. Penurunan harga minyak mentah yang lebih dari 60-an% dari harga awal tersebut mempengaruhi harga BMM di pasaran lokal (Indonesia) dan juga di sejumlah negara-negara lain di dunia (terutama […]
Read More
 

Information Technology

  • Posted by fedco
  • On January 8, 2015
  • 0 Comments
  • information technology
The Information Technology (IT) has revolutionising the modern living era. Starting from the Desktop PC innovation back on 1970’s with Apple and Microsoft as the two main innovator on this segment.  By the shifting of the time, people not just want to interact locally with their computing device but also eager to have some communication […]
Read More
 

Information Technology Security

  • Posted by fedco
  • On January 8, 2015
  • 0 Comments
  • it security
The term Information Technology security is actually a broad term that can cover a lot of things, from network infrastructure into personal internet security.  As the fundamental approach, we can divide the Information Technology security into two main domain, there are: 1. Corporate Domain 2. Personal Domain More or less the corporate domain of Information […]
Read More
 

Information Technology Security Policy

  • Posted by fedco
  • On January 8, 2015
  • 0 Comments
  • it security policy
The process and activities that the employees doing within the company should adhere to the deployed standard and regulation. The company will always want to ensure that every business activities that performed related to the company is following its standard and regulation, including for the Information Technology security segment. The Information Technology security assurance is […]
Read More
 

Network Management of ICS Environment

  • Posted by fedco
  • On January 5, 2015
  • 0 Comments
  • control system network, network management, network security architecture
Networking Architecture and Configuration Covering the whole ICS environment that required networked interconnection such as DCS (internally and externally), SIS (including its interconnection with DCS/SCADA), PLC, EMS, etc. The proper design and architecture will make easier for the operations and maintenance phase in order to maintain robustness and secure framework. The segregation between each system […]
Read More
 

Targeted Cyber Intrusion Detection and Mitigation Strategies

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • cyber security strategy, intrusion detection and prevention system
Overview Sophisticated and targeted cyber intrusions against owners and operators of industrial control systems across multiple critical infrastructure sectors have increased in recent months. ICS-CERT developed the following guidance to provide basic recommendations for owners and operators of critical infrastructure to mitigate the impacts of cyber attacks and enhance their network security posture. This guidance applies to organizations whose […]
Read More
 

Bash Shell Vulnerabillity – Security Threats to LINUX/UNIX Machine

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • bash shell vulnerability, security vulnerabilities
A bug discovered in the widely used GNU Bourne Again Shell (Bash), the common command-line shell used in most Linux/UNIX operating systems and Apple’s Mac OS X. The command interpreter poses a critical security risk to Unix and Linux systems since this flaw could allow an attacker to remotely execute shell commands by attaching malicious code […]
Read More
 

Are You Still Using Windows Server 2003 in Your Industrial Control System (ICS) Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • it security, windows security
It is (will be) the end of Windows Server 2003 support from Microsoft. Starting from July 14, 2015 the following support will no longer available for this Operating System, there are: 1. Security patches that help protect PCs from harmful viruses, spyware, and other malicious software 2. Assisted technical support from Microsoft 3. Software and content updates For […]
Read More