{"id":390,"date":"2023-11-07T23:43:13","date_gmt":"2023-11-07T23:43:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=390"},"modified":"2023-12-06T16:46:56","modified_gmt":"2023-12-06T16:46:56","slug":"how-do-engineers-make-cyber-networks-safer","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/07\/how-do-engineers-make-cyber-networks-safer\/","title":{"rendered":"How do engineers make cyber networks safer?"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>There are 3 main engineering focuses that work to protect cybersecurity functions. These jobs<br>typically work together to bring the highest protection against cyber threats. The goals for all 3<br>are aligned in completing the security triad of confidentiality, integrity, and availability.<br>Achieving each component is essential in protecting networks and the data they contain.<br>The first type of engineering I will touch on is Information Security. This type fixates on the<br>implementation to protect any type of confidential and sensitive data from unauthorized<br>individuals. This can be related to cyber as the sole focus around both items is protecting online<br>data. Information security can be looked at as the paperwork or background by some as it can<br>deal more with policies and procedures. This can include looking at log reports, reviewing the<br>aftermath of a breach, ensuring the systems are up to date, etc.<\/p>\n\n\n\n<p><br>The second type is Cybersecurity which may be implied with cyber, but the systems must be<br>managed, and attacks must be prevented therefore it is a role that is essential. Cybersecurity<br>analysts keep networks safe by preventing sensitive information from being taken and aim to<br>protect systems and the data on internet-connected networks. This job tests for vulnerabilities in<br>the system that could lead an attacker to breach. Test of new software is also completed to<br>make sure the firewalls and encryption programs are working as they should.<\/p>\n\n\n\n<p><br>Network security engineers are the last group I would like to focus on. This job is essential as<br>the focus of this field is the protection and configuration of firewalls, routers, and other<br>hardware or software. While this is mentioned last this position is not last for the protection of<br>cyberspace. These engineers are the first line of defense. While cybersecurity engineers<br>prevent and stop breaches, network engineers create the firewalls and use the software or<br>hardware to prevent the breaches to begin with. Reports are prepared on how the system can<br>be improved based on vulnerability testing, they create and enforce the security to keep others<br>from clicking on suspicious or corrupted links, etc.<\/p>\n\n\n\n<p><br>These 3 positions all have a key role in protecting the cyber networks as technology is<br>constantly evolving and all this works together to keep companies and consumers safer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are 3 main engineering focuses that work to protect cybersecurity functions. These jobstypically work together to bring the highest protection against cyber threats. The goals for all 3are aligned in completing the security triad of confidentiality, integrity, and availability.Achieving&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/07\/how-do-engineers-make-cyber-networks-safer\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/390"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"predecessor-version":[{"id":470,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/390\/revisions\/470"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}