Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.
Li-FI has some very interesting security characteristics too.
“An air gap is a network security measure that consists of ensuring that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.” (Wikipedia)
Note the emphasis in the word physically.
A number of forums have discussed whether data diodes are equivalent to air gaps in one direction, including a number of articles on this blog. In reality you can argue it both ways.
Great blog, observing that compliance does not equal security, and that internal culture is a key element.
While focused on the US energy sector, I’d suggest the same is true in the UK too.
A recent article in the NY Times claims:
The vast majority of targeted computer attacks now start with a malicious e-mail sent to a company employee. Now evidence suggests that the same technique could be used to attack watersheds, power grids, oil refineries and nuclear plants.
This cannot be allowed to happen, here I explore the issue in a little more detail.
Nexor have just released a briefing paper Air-Gaps, Firewalls and Data Diodes in Industrial Control Systems looking the issues around segregating industrial control system networks. What works best: Air Gaps, Firewalls or Data Diodes?
Due to recent security incidents, there is now a significant debate with regard to what is the best way to protect Industrial Control Systems (ICS).
Air Gaps are not as secure as you might think.