Blog

Cisco Router Secure Configuration Guidelines

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, router guidance, router security configuration, security architecture
Preface Routers direct and control much of the data flowing across computer networks. This guide provides technical guidance intended to help network administrators and security officers improve the security of their networks.  Using the information presented here, you can configure your routers to control access, resist attacks, shield other network components, and protect the integrity and […]
Read More
 

Industral Control System (SCADA) – 21 Steps Cyber Security Improvement

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
– Introduction – Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation’s critical infrastructure and require protection from a variety of threats that exist in cyber […]
Read More
 

Firewall Secure Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • firewall guidance, network security, security architecture
Executive Summary Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. At one time, most firewalls were deployed at network perimeters. This provided some measure of protection for internal hosts, but it could not recognize all instances and forms of attack, and attacks sent from one […]
Read More
 

Industrial Control System Cyber Security Evaluation Tool

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • CSET, cyber security evaluation tools, security evaluation tools
Overview Critical infrastructures are dependent on information technology systems and computer networks for essential operations. Particular emphasis is placed on the reliability and resiliency of the systems that comprise and interconnect these infrastructures. NCSD collaborates with partners from across public, private, and international communities to advance this goal by developing and implementing coordinated security measures […]
Read More
 

Industrial Control System Security Assurance Lifecycle

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security, ics security assurance, ics security lifecycle, industrial control system security
The Industrial Control System security assurance milestone is a lifecycle that should be performed in order to achieve the secure ICS environment and maintain its security level in the proper status. ICS security assurance lifecycle consist of three main entities, where each of it has specific activities that belong into it. Following is the summary of […]
Read More