Strategies for the security of operating technology