Network Management of ICS Environment

  • Posted by fedco
  • On January 5, 2015
  • 0 Comments
  • control system network, network management, network security architecture
Networking Architecture and Configuration Covering the whole ICS environment that required networked interconnection such as DCS (internally and externally), SIS (including its interconnection with DCS/SCADA), PLC, EMS, etc. The proper design and architecture will make easier for the operations and maintenance phase in order to maintain robustness and secure framework. The segregation between each system […]
Read More
 

Industrial Control System Security Guidelines

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security guidelines, ics security standard, nist sp 800-82
NIST SP 800-82 Executive Summary This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such […]
Read More
 

Industrial Control System Security Risk Management

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • risk assessment, security risk management
ICS Security Risk Management – The Overview of Risk The Risk Management in Industrial Control System environment is playing critical role in assessing the security posture of the ICS environment by plotting the asset into the risk level (in correlation with HSE, Financial and Operations). The framework to perform the risk management in ICS should […]
Read More
 

Optimization of Secure Control System Network and Business Network Segregation Architecture for Industrial Control System Cyber Security Assurance

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • business network, control system network, control system network segregation
Abstract – Nowadays, the evolution of Industrial Control System (ICS) environment from obsolete pneumatic control and proprietary platform into modern system with open protocol and common environment (e.g. Windows environment) has increase the threats (e.g. virus and malware, external or internal intruder, disaster) and system vulnerabilities (e.g. system unprotected properly against virus threats, registry errors […]
Read More
 

Industrial Control System as One of the National Security Asset

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • industrial control system security
Many of our colleagues still thinking that the security in ICS environment is just about virus attack from removable media, or internet downloaded files, at least this is what I feel and found, Some of the players in this environment even don’t know regarding what is BCP and DRP, and how to implement them on […]
Read More
 

Industrial Control System Security Assurance

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security, ics security assurance
Why ICS Security Assurance is Important Industrial Control System security concern has getting up and up in this decade due to the increasing cyber risk and attack that has been recorded across the globe that targeted ICS environment. The risk of cyber attack mostly came from internal organization, while the external portion also playing quiet […]
Read More
 

Industral Control System Top 10 Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The 10 Common Vulnerabilities of the Control Systems – NERC CSSWG NERC Cyber Infrastructure Protection (CIP), 10 CFR73/54/NEI 08-08, and International Instrument Users’ Association Working –Party on Instrument Behaviour (WIB) Compliance. U.S. National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD23) defines cyberspace as “the interdependent network of information technology infrastructures, and includes the […]
Read More
 

Industrial Control System Security Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The security assurance of Industrial Control System environment should be considered as one of the priority due to its critical function in the critical industry sector. The vulnerabilities of the ICS environment should be identified in order to implement the proper strategic action to control the risk into the ALARP level. This short article explain […]
Read More
 

Industral Control System (SCADA) – 21 Steps Cyber Security Improvement

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
– Introduction – Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation’s critical infrastructure and require protection from a variety of threats that exist in cyber […]
Read More
 

Industrial Control System Cyber Security Evaluation Tool

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • CSET, cyber security evaluation tools, security evaluation tools
Overview Critical infrastructures are dependent on information technology systems and computer networks for essential operations. Particular emphasis is placed on the reliability and resiliency of the systems that comprise and interconnect these infrastructures. NCSD collaborates with partners from across public, private, and international communities to advance this goal by developing and implementing coordinated security measures […]
Read More