Blog

Control System

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system
What is Control System The term of control system is refer to the system that has the main function to monitor, supervise and control the object variable and parameter in correlation with the production operations facilities, such as in oil and gas platform, petrochemical refinery, power plant generation and distribution, etc. The control system can […]
Read More
 

Process Control

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system, process control
The Art of Controlling The Process The process on this term means the sequence of treatment or action that being implemented to get the expected result of some product. The process should be controlled in order to have the end product result as per expectation. This is the process control basic understanding. The control action […]
Read More
 

Industral Control System Top 10 Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The 10 Common Vulnerabilities of the Control Systems – NERC CSSWG NERC Cyber Infrastructure Protection (CIP), 10 CFR73/54/NEI 08-08, and International Instrument Users’ Association Working –Party on Instrument Behaviour (WIB) Compliance. U.S. National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD23) defines cyberspace as “the interdependent network of information technology infrastructures, and includes the […]
Read More
 

Cyber Security Best Practices for Business Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • cyber security practices, it security
The security incident can be triggered from just simple activities, such as downloading file from un-trusted sources by using business computing system. The cyber security awareness and understanding should be familiarized to all of internal resources, especially to the critical positions. In general, to build a robust security culture in the organization, it requires the […]
Read More
 

Guide to Intrusion Detection Prevention System

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • IDPS security guidance
Executive Summary Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.  Intrusion prevention is the process of performing intrusion detection and attempting to stop […]
Read More
 

Industrial Control System Security Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The security assurance of Industrial Control System environment should be considered as one of the priority due to its critical function in the critical industry sector. The vulnerabilities of the ICS environment should be identified in order to implement the proper strategic action to control the risk into the ALARP level. This short article explain […]
Read More
 

Cisco IOS Switch Security Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, security architecture, switch security
Overview Switches direct and control much of the data flowing across computer networks.  This guide provides technical recommendations intended to help network administrators improve the security of their networks.  Using the information presented here, the administrators can configure switches to control access, resist attacks, shield other network systems and protect the integrity and confidentiality of […]
Read More
 

Cisco Router Secure Configuration Guidelines

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, router guidance, router security configuration, security architecture
Preface Routers direct and control much of the data flowing across computer networks. This guide provides technical guidance intended to help network administrators and security officers improve the security of their networks.  Using the information presented here, you can configure your routers to control access, resist attacks, shield other network components, and protect the integrity and […]
Read More
 

Industral Control System (SCADA) – 21 Steps Cyber Security Improvement

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
– Introduction – Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation’s critical infrastructure and require protection from a variety of threats that exist in cyber […]
Read More
 

Firewall Secure Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • firewall guidance, network security, security architecture
Executive Summary Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. At one time, most firewalls were deployed at network perimeters. This provided some measure of protection for internal hosts, but it could not recognize all instances and forms of attack, and attacks sent from one […]
Read More