Systems security engineering utilize math, science, and principles of measurement to maintain proper security and network safety. Engineers make cyber networks safer by establishing trustworthy systems and components and addressing system failures. According to the “Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems”, there are 3 roles that consist of system security capabilities, security-driven constraints, and advising of protection of data. Furthermore, the security engineering framework consists of defining the problem, searching for the solution, and maintaining trustworthiness. By establishing the limitations and vulnerabilities of the current system and properly identifying the problems it is currently facing engineers can make proper and consistent improvements.
A trustworthy network is less susceptible to the effects of attacks put together by smart, well-organized criminals, and meets specific security requirements. The design of the system is able to increase the level of penetration resistance and with a higher level of trustworthiness, a system is able to effectively respond to disruptions. The faster the disruption is caught and handled, the less time there is for damage to occur, which is sometimes irreparable. Cyber networks are also made safer by engineers’ mission to continue finding ways to improve already established systems because attackers are always looking for new ways to successfully carry out their plans. In addition to this, engineers properly destroy older systems that are no longer used so that cyber criminals do not have a foundation to use and explore something that would help them understand the technology being used with current protective systems.
The overall responsibilities of engineering in regard to cyber network security can be summarized with three terms predictability, manageability, and dissociability. All three are needed to properly formulate a plan that is successful and brainstorm ways to keep said plan efficient and address concerns such as hacking, malicious coding, and denial of service.
Leave a Reply