CYSE 200T – How do engineers make cyber networks safer?

System security engineering is essentially laced with everyday utilities such as power grids and fiber optic internet services. These engineering systems can use the SCADA systems to monitor live readings from the systems, and analyze the data for the best practices for efficiency and safety. With the advancement of these systems utilizing RTUs that provide information to the SCADA systems, there is a massive benefit. The systems engineer would use the SCADA to observe the system, and make intelligent decisions on adjustment. In the Systems Security Engineering article, it is stated that the engineers must have a discipline to have a thorough understanding of a problem when they arise, and consider all of the feasible solution options before acting on the solution.

For a thorough analysis of an engineer to make a cyber network safer, they have to participate in all stages of engineering systems implementation. The obvious first encounter is when new systems are being set up. The engineer analyzes the feasibility of the new system in relation to the current engineering process, studies all of the alternatives, and analyzes the potential impact of the new system. The engineer at this stage provides proper security contribution at the concept level.

The other stage in the modification to the current systems. Engineers can participate to reactive modifications to the engineering systems when there are disruptions to the systems. When a cyber-attack happens to a system, the threat is assessed, along with the impact of the attack, then a solution to resume operations. This will make the cyber networks safer by potentially identifying threats and vulnerabilities, and attempting to provide a proper protection from the threat.

Engineers can also contribute to the safety of a cyber network by providing planned upgrades. These system upgrades can provide new capability for the system, with new ways to adjust the specifications of the systems, and provide new reactive methods for protection of the cyber networks.

Leave a Reply

Your email address will not be published. Required fields are marked *