IT and ICS Security Assurance

Consultant | Training | Solutions
Fedco International, PT.

Welcome to Fedco - IT and ICS Security Consultant

IT Security and Its Implication to Plant Control System Integrity

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • control system security, it security
Have we ever heard some attack targeted to some big companies by using email attachment + virus/trojan injection as the vector attack? How is about the awareness of our employees regarding the cyber security threat that waiting every single second to launch their attack once we missed our defense. It is a common attack by […]
Read More
 

Cyber Security Best Practices for Business Environment

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • cyber security practices, it security
The security incident can be triggered from just simple activities, such as downloading file from un-trusted sources by using business computing system. The cyber security awareness and understanding should be familiarized to all of internal resources, especially to the critical positions. In general, to build a robust security culture in the organization, it requires the […]
Read More
 

Guide to Intrusion Detection Prevention System

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • IDPS security guidance
Executive Summary Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.  Intrusion prevention is the process of performing intrusion detection and attempting to stop […]
Read More
 

Cisco IOS Switch Security Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, security architecture, switch security
Overview Switches direct and control much of the data flowing across computer networks.  This guide provides technical recommendations intended to help network administrators improve the security of their networks.  Using the information presented here, the administrators can configure switches to control access, resist attacks, shield other network systems and protect the integrity and confidentiality of […]
Read More
 

Cisco Router Secure Configuration Guidelines

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • network security, router guidance, router security configuration, security architecture
Preface Routers direct and control much of the data flowing across computer networks. This guide provides technical guidance intended to help network administrators and security officers improve the security of their networks.  Using the information presented here, you can configure your routers to control access, resist attacks, shield other network components, and protect the integrity and […]
Read More
 

Firewall Secure Configuration Guide

  • Posted by fedco
  • On January 4, 2015
  • 0 Comments
  • firewall guidance, network security, security architecture
Executive Summary Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. At one time, most firewalls were deployed at network perimeters. This provided some measure of protection for internal hosts, but it could not recognize all instances and forms of attack, and attacks sent from one […]
Read More