IT and ICS Security Assurance

Consultant | Training | Solutions
Fedco International, PT.

Welcome to Fedco - IT and ICS Security Consultant

Blog

Industral Control System Top 10 Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The 10 Common Vulnerabilities of the Control Systems – NERC CSSWG NERC Cyber Infrastructure Protection (CIP), 10 CFR73/54/NEI 08-08, and International Instrument Users’ Association Working –Party on Instrument Behaviour (WIB) Compliance. U.S. National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD23) defines cyberspace as “the interdependent network of information technology infrastructures, and includes the […]
Read More
 

Cyber Security Best Practices for Business Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • cyber security practices, it security
The security incident can be triggered from just simple activities, such as downloading file from un-trusted sources by using business computing system. The cyber security awareness and understanding should be familiarized to all of internal resources, especially to the critical positions. In general, to build a robust security culture in the organization, it requires the […]
Read More
 

Guide to Intrusion Detection Prevention System

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • IDPS security guidance
Executive Summary Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.  Intrusion prevention is the process of performing intrusion detection and attempting to stop […]
Read More
 

Industrial Control System Security Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The security assurance of Industrial Control System environment should be considered as one of the priority due to its critical function in the critical industry sector. The vulnerabilities of the ICS environment should be identified in order to implement the proper strategic action to control the risk into the ALARP level. This short article explain […]
Read More
 

Cisco IOS Switch Security Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, security architecture, switch security
Overview Switches direct and control much of the data flowing across computer networks.  This guide provides technical recommendations intended to help network administrators improve the security of their networks.  Using the information presented here, the administrators can configure switches to control access, resist attacks, shield other network systems and protect the integrity and confidentiality of […]
Read More
 

Cisco Router Secure Configuration Guidelines

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, router guidance, router security configuration, security architecture
Preface Routers direct and control much of the data flowing across computer networks. This guide provides technical guidance intended to help network administrators and security officers improve the security of their networks.  Using the information presented here, you can configure your routers to control access, resist attacks, shield other network components, and protect the integrity and […]
Read More
 

Industral Control System (SCADA) – 21 Steps Cyber Security Improvement

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
– Introduction – Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation’s critical infrastructure and require protection from a variety of threats that exist in cyber […]
Read More
 

Firewall Secure Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • firewall guidance, network security, security architecture
Executive Summary Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. At one time, most firewalls were deployed at network perimeters. This provided some measure of protection for internal hosts, but it could not recognize all instances and forms of attack, and attacks sent from one […]
Read More
 

Industrial Control System Cyber Security Evaluation Tool

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • CSET, cyber security evaluation tools, security evaluation tools
Overview Critical infrastructures are dependent on information technology systems and computer networks for essential operations. Particular emphasis is placed on the reliability and resiliency of the systems that comprise and interconnect these infrastructures. NCSD collaborates with partners from across public, private, and international communities to advance this goal by developing and implementing coordinated security measures […]
Read More
 

Industrial Control System Security Assurance Lifecycle

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security, ics security assurance, ics security lifecycle, industrial control system security
The Industrial Control System security assurance milestone is a lifecycle that should be performed in order to achieve the secure ICS environment and maintain its security level in the proper status. ICS security assurance lifecycle consist of three main entities, where each of it has specific activities that belong into it. Following is the summary of […]
Read More