Portfolio Entry #10

Engineers help to make cyber networks safer in multiple ways. The first way is observing reaction modifications to fielded systems. This means that the engineering effort responds to things such as disruptions, hazards, and threats, as well as cyber-attacks, incidents, errors, and any other unexpected occurrence. This can occur during any of the three stages of the system life cycle. Another way engineers help make cyber networks safer is by upgrading fielded systems. This means that the planned system upgrades already on a system can enhance an existing capability, which can extend the length of security measures within the system. Security-dedicated and security-purposed systems also deliver a system that satisfies a security-dedicated need or provides a security-oriented purpose which includes surveillance cameras, monitoring systems such as motion sensors, and security service provisioning systems. Systems security engineers must focus on protection stakeholders and system assets in order to exercise control over asset loss and the associated consequences that would come with it. Things such as carrying out specific activities and tasks in the system life cycle processes with the objective of eliminating or reducing vulnerabilities and minimizing or constraining the impact of exploiting or triggering those vulnerabilities help to achieve the proper amount of protection. Being able to recognize, minimize, and constrain impact includes continued delivery of partial or full secure system function. This helps to reduce the susceptibility of systems to a variety of different types of threats, including cyber-attacks, hybrid attacks, and physical attacks. A systems security engineer must be able to provide several distinct perspectives and focus on areas which set it apart from other engineering disciplines in order to accomplish certain security objectives. These security objectives include the engineering of security functions, addressing security aspects associated with the engineering of non-security functions, and protecting intellectual property and otherwise sensitive data.

Leave a Reply

Your email address will not be published. Required fields are marked *