Why IT Cryptography Could Make Critical Infrastructure Less Safe—Part 2
In this video, Senior Research Engineer Colin Gordon proposes that cryptographic implementations for data in transit should be different for elements in a system that are static (fixed-task, fixed-configuration, and machine-oriented) vs. dynamic (designed to serve human users, reconfigurable, and plug-and-play). He also discusses the secure-by-design and defense-in-depth strategies for designing, building, and maintaining secure electric power systems.
This is the second video in a series on cryptography tools and critical infrastructure. Watch Part 1.
Contributor
Colin Gordon
Senior Research Engineer, Research & Developmentcolin_gordon@selinc.comView full bioContribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.
Video
Watch a video exploring why IT cryptographic tools may not be the best choice for defending critical infrastructure.
Tech Paper
Learn why security techniques commonly used in IT may be unsuitable for application in critical energy systems.
Video
Learn how the CIA triad informs how to apply cryptography to operational technology (OT) networks.