Entry Eight
How do engineers make cyber networks safer?
Security engineers focus on the design, implementation and continuation of cyber technology on networks over the course of the system’s life cycle. This includes both technical and nontechnical procedures, taking into consideration the needs and expectations of stakeholders. Technical considerations begin when designing the cyber network and continue until the retirement of the project. Engineers must balance the costs, design constraints, schedule and effectiveness when creating a solution that incorporates an acceptable level of risk. Once implemented, engineers are responsible for the continued testing of security software, monitoring systems and networks for intrusions on active cyber-attacks, and continuing their own education on new types of security threats and vulnerabilities in order to make recommendations to management on security enhancements or changes. Nontechnical considerations may include coordinating efforts and concerns between the engineering team and stakeholders, as well as management over all aspects of the project. Engineers may be responsible for developing sets of security procedures, standards and practices for a company’s network and being the liaison to management to keep them aware of the ongoing risks and budgeting considerations related to cybersecurity measures.
When thinking of technical specific duties engineers are responsible for in order to keep networks safe, their duties can be varied and will change over time in response to new cyber threats since the field is constantly changing as technology evolves. One example is how the integration of the Internet of Things (IoT) affected older procedures and practices on cyber networks. Prior to the widespread use of IoT, security engineers would not have considered the security risk a smart device would have on a company’s network. Engineers must adapt to the constant evolving nature of technology by staying current on technology trends and cyber attacks and vulnerabilities. They must also continually monitor networks for vulnerabilities and abnormal system behavior, conduct penetration testing, maintain a current understanding of industry security and testing standards, supervise changes in software, hardware and user needs, and manage incident responses to incidents.
Leave a Reply