IT and ICS Security Assurance

Consultant | Training | Solutions
Fedco International, PT.

Welcome to Fedco - IT and ICS Security Consultant

Industrial Control System Security Risk Management

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • risk assessment, security risk management
ICS Security Risk Management – The Overview of Risk The Risk Management in Industrial Control System environment is playing critical role in assessing the security posture of the ICS environment by plotting the asset into the risk level (in correlation with HSE, Financial and Operations). The framework to perform the risk management in ICS should […]
Read More
 

Optimization of Secure Control System Network and Business Network Segregation Architecture for Industrial Control System Cyber Security Assurance

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • business network, control system network, control system network segregation
Abstract – Nowadays, the evolution of Industrial Control System (ICS) environment from obsolete pneumatic control and proprietary platform into modern system with open protocol and common environment (e.g. Windows environment) has increase the threats (e.g. virus and malware, external or internal intruder, disaster) and system vulnerabilities (e.g. system unprotected properly against virus threats, registry errors […]
Read More
 

Industrial Control System as One of the National Security Asset

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • industrial control system security
Many of our colleagues still thinking that the security in ICS environment is just about virus attack from removable media, or internet downloaded files, at least this is what I feel and found, Some of the players in this environment even don’t know regarding what is BCP and DRP, and how to implement them on […]
Read More
 

Industrial Control System Security Assurance

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security, ics security assurance
Why ICS Security Assurance is Important Industrial Control System security concern has getting up and up in this decade due to the increasing cyber risk and attack that has been recorded across the globe that targeted ICS environment. The risk of cyber attack mostly came from internal organization, while the external portion also playing quiet […]
Read More
 

Industral Control System Top 10 Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The 10 Common Vulnerabilities of the Control Systems – NERC CSSWG NERC Cyber Infrastructure Protection (CIP), 10 CFR73/54/NEI 08-08, and International Instrument Users’ Association Working –Party on Instrument Behaviour (WIB) Compliance. U.S. National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD23) defines cyberspace as “the interdependent network of information technology infrastructures, and includes the […]
Read More
 

Industrial Control System Security Vulnerabilities

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security vulnerabilities
The security assurance of Industrial Control System environment should be considered as one of the priority due to its critical function in the critical industry sector. The vulnerabilities of the ICS environment should be identified in order to implement the proper strategic action to control the risk into the ALARP level. This short article explain […]
Read More
 

Industral Control System (SCADA) – 21 Steps Cyber Security Improvement

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
– Introduction – Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation’s critical infrastructure and require protection from a variety of threats that exist in cyber […]
Read More
 

Industrial Control System Cyber Security Evaluation Tool

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • CSET, cyber security evaluation tools, security evaluation tools
Overview Critical infrastructures are dependent on information technology systems and computer networks for essential operations. Particular emphasis is placed on the reliability and resiliency of the systems that comprise and interconnect these infrastructures. NCSD collaborates with partners from across public, private, and international communities to advance this goal by developing and implementing coordinated security measures […]
Read More
 

Industrial Control System Security Assurance Lifecycle

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • ics security, ics security assurance, ics security lifecycle, industrial control system security
The Industrial Control System security assurance milestone is a lifecycle that should be performed in order to achieve the secure ICS environment and maintain its security level in the proper status. ICS security assurance lifecycle consist of three main entities, where each of it has specific activities that belong into it. Following is the summary of […]
Read More