There are 3 main engineering focuses that work to protect cybersecurity functions. These jobs
typically work together to bring the highest protection against cyber threats. The goals for all 3
are aligned in completing the security triad of confidentiality, integrity, and availability.
Achieving each component is essential in protecting networks and the data they contain.
The first type of engineering I will touch on is Information Security. This type fixates on the
implementation to protect any type of confidential and sensitive data from unauthorized
individuals. This can be related to cyber as the sole focus around both items is protecting online
data. Information security can be looked at as the paperwork or background by some as it can
deal more with policies and procedures. This can include looking at log reports, reviewing the
aftermath of a breach, ensuring the systems are up to date, etc.


The second type is Cybersecurity which may be implied with cyber, but the systems must be
managed, and attacks must be prevented therefore it is a role that is essential. Cybersecurity
analysts keep networks safe by preventing sensitive information from being taken and aim to
protect systems and the data on internet-connected networks. This job tests for vulnerabilities in
the system that could lead an attacker to breach. Test of new software is also completed to
make sure the firewalls and encryption programs are working as they should.


Network security engineers are the last group I would like to focus on. This job is essential as
the focus of this field is the protection and configuration of firewalls, routers, and other
hardware or software. While this is mentioned last this position is not last for the protection of
cyberspace. These engineers are the first line of defense. While cybersecurity engineers
prevent and stop breaches, network engineers create the firewalls and use the software or
hardware to prevent the breaches to begin with. Reports are prepared on how the system can
be improved based on vulnerability testing, they create and enforce the security to keep others
from clicking on suspicious or corrupted links, etc.


These 3 positions all have a key role in protecting the cyber networks as technology is
constantly evolving and all this works together to keep companies and consumers safer.