Engineers play a crucial role in making cyber networks safer by designing and implementing security measures to protect against cyber threats. Some of the ways the work to secure a network involve using tools such as risk assessments, intrusion detection systems, encryptions, penetration testing, access control, and security monitoring. The first tool, risk assessment, involves perform a comprehensive risk assessment to identify vulnerabilities and threats that could potentially harm the network. Based on this assessment, they develop strategies and implement measures to mitigate these risks. The next two tools, intrusion detection systems and penetration testing are often used together when implemented in a system. Engineers create intrusion detection systems to prevent unauthorized access to the network. These systems are designed to detect and block suspicious activity, preventing attacks before they can cause damage. Some systems also notify personnel on the security team if there has been a breach in the network from an external device. By performing regular penetration testing to identify weaknesses in the network. Engineers can address them before they can be exploited by attackers. These tests simulate real-world attacks, DDOS, trojans, open port exploitation to evaluate the effectiveness of the security measures in place. Implementation of encryption technologies is used to protect sensitive data from being intercepted and stolen by hackers. Encryption ensures that the data can only be accessed by authorized parties by using “keys” that are both public and private. The next tool, access control, sets up access controls to ensure that only authorized personnel have access to sensitive information and systems. This includes enforcing password policies, multi-factor authentication, and other access control mechanisms. The last tool is security monitoring, security monitoring systems to detect and respond to security incidents. This falls under monitoring network traffic for suspicious activity and responding to security alerts in real-time.