Blog

Industrial Control System Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system environment, ics environment
ICS Environment Industrial Control System (ICS) is one of the common term that being used to cover some system entities that have similar functions and positions within the automation control environment in the organization. Some of the core function of Industrial Control System (ICS) are as per the following: 1. Controlling the plant entities 2. […]
Read More
 

Industrial Control System Security Assurance

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security, ics security assurance
Why ICS Security Assurance is Important Industrial Control System security concern has getting up and up in this decade due to the increasing cyber risk and attack that has been recorded across the globe that targeted ICS environment. The risk of cyber attack mostly came from internal organization, while the external portion also playing quiet […]
Read More
 

Control System Engineering

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system engineering
What is Control System Engineering The control system engineering is one of the engineering sub-major field study that usually reside under the electrical engineering major. The concern of the control system engineering is related to the controls theory, controls framework, PID controller, fundamental of controls concept, open loop, close loop, feedback control, batch control, cascade […]
Read More
 

Control System

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system
What is Control System The term of control system is refer to the system that has the main function to monitor, supervise and control the object variable and parameter in correlation with the production operations facilities, such as in oil and gas platform, petrochemical refinery, power plant generation and distribution, etc. The control system can […]
Read More
 

Process Control

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system, process control
The Art of Controlling The Process The process on this term means the sequence of treatment or action that being implemented to get the expected result of some product. The process should be controlled in order to have the end product result as per expectation. This is the process control basic understanding. The control action […]
Read More
 

Industral Control System Top 10 Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The 10 Common Vulnerabilities of the Control Systems – NERC CSSWG NERC Cyber Infrastructure Protection (CIP), 10 CFR73/54/NEI 08-08, and International Instrument Users’ Association Working –Party on Instrument Behaviour (WIB) Compliance. U.S. National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD23) defines cyberspace as “the interdependent network of information technology infrastructures, and includes the […]
Read More
 

Cyber Security Best Practices for Business Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • cyber security practices, it security
The security incident can be triggered from just simple activities, such as downloading file from un-trusted sources by using business computing system. The cyber security awareness and understanding should be familiarized to all of internal resources, especially to the critical positions. In general, to build a robust security culture in the organization, it requires the […]
Read More
 

Guide to Intrusion Detection Prevention System

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • IDPS security guidance
Executive Summary Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.  Intrusion prevention is the process of performing intrusion detection and attempting to stop […]
Read More
 

Industrial Control System Security Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The security assurance of Industrial Control System environment should be considered as one of the priority due to its critical function in the critical industry sector. The vulnerabilities of the ICS environment should be identified in order to implement the proper strategic action to control the risk into the ALARP level. This short article explain […]
Read More
 

Cisco IOS Switch Security Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, security architecture, switch security
Overview Switches direct and control much of the data flowing across computer networks.  This guide provides technical recommendations intended to help network administrators improve the security of their networks.  Using the information presented here, the administrators can configure switches to control access, resist attacks, shield other network systems and protect the integrity and confidentiality of […]
Read More