Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept of state to provide the equivalent of system isolation from hostile traffic on the network.

Provided by: SecurityTube.net Topic: Security Date Added: Jan 2014 Format: Webcast

Find By Topic