Engineers employ multiple tools to ensure that cyber networks are safe. Due to the exponential growth in technology, the need for secure information technology systems too has grown. Considering there is a potential entry point for attack in each device, cyber technology can have a detrimental impact for those that would exploit engineering systems. Engineers must ensure that stakeholder and systems assets remain protected, and exercise control over asset loss and the consequences involved. Examples of engineering systems include distributed power supply systems, water supply systems, transportation systems, agriculture systems, and vulnerable IoT (Internet of Things) devices. IoT devices are those such as personal webcams or industrial controllers. Unauthorized access can result in system and structural failures, natural disasters, or both physical and cyberthreats. As such engineers must also apply management principles and techniques to optimize security, operational effectiveness, and costs throughout the system’s life cycle.
Vulnerabilities can result in cyberattacks like the one that affected Ukraine’s power in 2015. By utilizing spam sent in an email, a hacker was able to gain access using BlackEnergy malware. This resulted in over two hundred thousand (200,000) consumers losing power for up to 6 hours. This attack was significant because it marked the first successful attack on a power grid that was publicly acknowledged. Another well-known attack was the New York dam attack that took place in 2016. Hackers gained access through a cellular modem and infiltrated the command and controls system of the New York dam. The group that the hackers originated from were also targeting multiple financial institutions, the New York Stock Exchange and AT&T with a bombardment of incoming emails meant to slow down or shut down computers. These examples highlight the importance of systems security engineering professionals and maintaining secure infrastructures by employing sound security design concepts and principles throughout the system’s life.