{"id":332,"date":"2023-03-31T02:04:20","date_gmt":"2023-03-31T02:04:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rknap004\/?p=332"},"modified":"2023-09-09T23:18:55","modified_gmt":"2023-09-09T23:18:55","slug":"eportfolio-entry-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/03\/31\/eportfolio-entry-10\/","title":{"rendered":"CYSE 200T-ePortfolio entry #10"},"content":{"rendered":"\n<p><strong>Q: How do engineers make cyber networks safer?<\/strong><\/p>\n\n\n\n<p>A: While seemingly very narrow upon it&#8217;s first glance, cybersecurity as a whole is a very interdisciplinary field of study, with lots of different fields working together in order to make computer systems and networks safer. One of the biggest contributors to cybersecurity and its development actually comes with engineers. In fact, all kinds of engineers play a crucial role in the protection and safety of computer networks. One of the biggest ways that engineers protect cyber systems is through a process known as  &#8220;privacy engineering&#8221;. In this specific engineering position, engineers are tasked with developing framework that allows &#8220;freedom from conditions that can create problems for individuals&#8221; when working in a business and handling Personable Identifiable Information (PII) . Essentially, engineers take a look at a  businesses and privacy information that could be taken from either workers or clients; moreover, they then use this data to create privacy frameworks. These privacy frameworks are then used to create security measures to protect privacy data, outline what kind of data that the business can process, and how to implement this system into the organization. These privacy engineers are extremely important for any kind of business, as the handling and processing of PII and privacy data is crucial both for the integrity of the business and for the safety of who that information belongs to. Furthermore, another valuable position in cybersecurity are system engineers. These engineers analyze and implement procedures within the system that &#8220;satisfy stakeholder requirements and critical quality properties&#8221;. Due to the amount of management and maintenance, this position is essential for the general upkeep and operations of the system. Furthermore, these system engineers work in tandem with privacy engineers, as system engineers also have &#8220;to take in individuals\u2019 privacy interests into account&#8221; when managing the system, especially within the privacy engineer&#8217;s framework for privacy. Overall, engineers are vital for the protection and security of cyber systems for their ability to create new procedures that benefit multiple parties in businesses and organizations alike.<\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>Brooks, S. W., Garcia, M. E., Lefkovitz, N. B., Lightman, S., &amp; Nadeau, E. M. (2018, November 10).&nbsp;<em>An introduction to privacy engineering and risk management in Federal Information Systems<\/em>. NIST. Retrieved March 22, 2023, from&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.nist.gov\/publications\/introduction-privacy-engineering-and-risk-management-federal-information-systems\" target=\"_blank\">https:\/\/www.nist.gov\/publications\/introduction-privacy-engineering-and-risk-management-federal-information-systems<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Q: How do engineers make cyber networks safer? A: While seemingly very narrow upon it&#8217;s first glance, cybersecurity as a whole is a very interdisciplinary field of study, with lots of different fields working together in order to make computer systems and networks safer. One of the biggest contributors to cybersecurity and its development actually&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/03\/31\/eportfolio-entry-10\/\">Read More<\/a><\/div>\n","protected":false},"author":24879,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/332"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/users\/24879"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":401,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/332\/revisions\/401"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}