Publication #10

on

How do engineers make cyber networks safer? 

System security engineers’ main goal is to protect the stakeholders and system assets. This is achieved by deploying tasks in the system life cycle processes with the goal of reducing of terminating vulnerabilities and minimizing the impact of exploiting or triggering those vulnerabilities. Engineers reduce the susceptibility of systems in various levels of threats including physical and cyber-attacks by understanding the stakeholder’s protection needs and employing sound security design principles and concepts through the system life cycle processes, resulting in the creation of systems more secure. As we know in these modern times where technology keeps modernize every second so is cyber criminals that are constantly looking for vulnerabilities in the systems and abuse them forcing cyber engineers to keep up to date knowledge, open mind, and constant studying to implement, keep up to date and create new methods to stop cyber criminals. For example, by programing software or programing updates in vulnerabilities (patching).  

The system security engineering framework provides a conceptual view of the key contexts within which systems security engineering activities are conducted. The framework is independent of system type, a set of interacting contexts. This framework emphasizes an integrated, holistic security perspective across all stages of the system life cycle and is applied to satisfy the milestone objectives of each life cycle stage. There are three contexts in which security engineering activities are conducted: problem context, solution context, and trustworthiness context. By establishing these contexts, it helps to ensure that engineering of a system is driven by a sufficiently complete understanding of the problem articulated in a set of stakeholder security. 

The problem context allows engineers to focus their attention on receiving output from stakeholders about the problems and find a feasible solution. 

The solution context transforms the stakeholder security requirements into design of systems. 

The trustworthiness context is a decision-making context that provides an evidence-based demonstration, through reasoning, that the system-of-interest is deemed trustworthy based upon a set of claims derived from security objectives. Finally providing assurance that the system is well structured. 

Leave a Reply

Your email address will not be published. Required fields are marked *