Provided by: SecurityTube.net
Date Added: Jan 2014
Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept of state to provide the equivalent of system isolation from hostile traffic on the network.