Journal Entry 10

Engineers make cyber networks stronger by developing, evolving, applying, and enforcing best practices. More commonly known practices such as strong passwords as well as lesser-known practices or more complex methods such as intrusion detection and monitoring are all products of the cyber engineer. Integration of engineers whether in house or by paying for a service is necessary to adequately protect the cyber networks of consumers and professionals.

With the cyber industry there are many forms of the engineer. In academics and research engineers develop and study new and advanced methods and techniques. Businesses are built around engineers applying a method to offer a product for a consumer. Businesses and individuals hire and integrate in-house engineers to oversee and apply cyber network security. At a higher-level engineers of non-cyber disciplines contribute to the safety and security of cyber networks as well.

The physical security of cyber networks and appliances is critical. Engineers who develop hardware and access denial equipment are foundational to security. Without the ability to keep the environment and criminals physically away from the network the tasks of the cyber engineer would be nearly impossible.

The cyber engineer protects from unauthorized access and misuse of cyber networks. Humans are inherently lazy or rather will take the path of least resistance is the alternative is not clearly more beneficial. Our community wide level of cyber education is still a domain requiring significant improvement. The widespread attitude of “it won’t happen to me” exposes cyber networks. Without diligent engineers more significant intrusions and losses would occur. The now infamous story of the Amazon CEO having his phone compromised and finding out, among other mistakes, he was using a very old and unsupported version of a phone is one well documented example of a failure in oversite and best practice enforcement. Networks are critical to modern human life at the individual and commercial level to the point where dedicated network defenders are critical.

Leave a Reply

Your email address will not be published. Required fields are marked *