Security engineering
   HOME

TheInfoList



OR:

Security engineering is the process of incorporating security controls into an
information system An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems are composed by four components: task, people ...
so that the controls become an integral part of the system’s operational capabilities. It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy pre-defined functional and user
requirements In product development and process optimization, a requirement is a singular documented physical or functional need that a particular design, product or process aims to satisfy. It is commonly used in a formal sense in engineering design, inclu ...
, but it has the added dimension of preventing misuse and malicious behavior. Those constraints and restrictions are often asserted as a
security policy Security policy is a definition of what it means to ''be secure'' for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms ...
. In one form or another, security engineering has existed as an informal field of study for several centuries. For example, the fields of locksmithing and security printing have been around for many years. The concerns for modern security engineering and computer systems were first solidified in a RAND paper from 1967, "Security and Privacy in Computer Systems" by Willis H. Ware. This paper, later expanded in 1979, provided many of the fundamental information security concepts, labelled today as Cybersecurity, that impact modern computer systems, from cloud implementations to embedded IoT. Recent catastrophic events, most notably
9/11 The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
, have made security engineering quickly become a rapidly-growing field. In fact, in a report completed in 2006, it was estimated that the global security industry was valued at US $150 billion. Security engineering involves aspects of
social science Social science is one of the branches of science, devoted to the study of societies and the relationships among individuals within those societies. The term was formerly used to refer to the field of sociology, the original "science of s ...
,
psychology Psychology is the science, scientific study of mind and behavior. Psychology includes the study of consciousness, conscious and Unconscious mind, unconscious phenomena, including feelings and thoughts. It is an academic discipline of immens ...
(such as designing a system to " fail well", instead of trying to eliminate all sources of error), and
economics Economics () is the social science that studies the production, distribution, and consumption of goods and services. Economics focuses on the behaviour and interactions of economic agents and how economies work. Microeconomics anal ...
as well as
physics Physics is the natural science that studies matter, its fundamental constituents, its motion and behavior through space and time, and the related entities of energy and force. "Physical science is that department of knowledge which ...
,
chemistry Chemistry is the scientific study of the properties and behavior of matter. It is a natural science that covers the elements that make up matter to the compounds made of atoms, molecules and ions: their composition, structure, proper ...
,
mathematics Mathematics is an area of knowledge that includes the topics of numbers, formulas and related structures, shapes and the spaces in which they are contained, and quantities and their changes. These topics are represented in modern mathematics ...
, criminology
architecture Architecture is the art and technique of designing and building, as distinguished from the skills associated with construction. It is both the process and the product of sketching, conceiving, planning, designing, and constructing buildings ...
, and
landscaping Landscaping refers to any activity that modifies the visible features of an area of land, including the following: # Living elements, such as flora or fauna; or what is commonly called gardening, the art and craft of growing plants with a goal ...
. Some of the techniques used, such as fault tree analysis, are derived from safety engineering. Other techniques such as
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
were previously restricted to military applications. One of the pioneers of establishing security engineering as a formal field of study is Ross Anderson.


Qualifications

No single qualification exists to become a security engineer. However, an undergraduate and/or graduate degree, often in
computer science Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
, computer engineering, or physical protection focused degrees such as Security Science, in combination with practical work experience (systems, network engineering,
software development Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components. Software development invo ...
, physical protection system modelling etc.) most qualifies an individual to succeed in the field. Other degree qualifications with a security focus exist. Multiple
certifications Certification is the provision by an independent body of written assurance (a certificate) that the product, service or system in question meets specific requirements. It is the formal attestation or confirmation of certain characteristics of a ...
, such as the
Certified Information Systems Security Professional CISSP (Certified Information Systems Security Professional) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As of January, 2022 there ...
, or Certified Physical Security Professional are available that may demonstrate expertise in the field. Regardless of the qualification, the course must include a knowledge base to diagnose the security system drivers, security theory and principles including defense in depth, protection in depth, situational crime prevention and crime prevention through environmental design to set the protection strategy (professional inference), and technical knowledge including physics and mathematics to design and commission the engineering treatment solution. A security engineer can also benefit from having knowledge in cyber security and information security. Any previous work experience related to privacy and computer science is also valued. All of this knowledge must be braced by professional attributes including strong communication skills and high levels of literacy for engineering report writing. Security engineering also goes by the label Security Science.


Related-fields

*
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of Risk management information systems, information risk management. It typically involves preventing or re ...
:*See esp.
Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
:*protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption to access. *
Physical security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Phy ...
:*deter attackers from accessing a facility, resource, or information stored on physical media. * Technical surveillance counter-measures *
Economics of security The economics of information security addresses the economic aspects of privacy and computer security. Economics of information security includes models of the strictly rational “homo economicus” as well as behavioral economics. Economics of ...
:*the economic aspects of economics of privacy and computer security.


Methodologies

Technological advances, principally in the field of
computer A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations ( computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These prog ...
s, have now allowed the creation of far more complex systems, with new and complex security problems. Because modern systems cut across many areas of human endeavor, security engineers not only need consider the mathematical and physical properties of systems; they also need to consider attacks on the people who use and form parts of those systems using social engineering attacks. Secure systems have to resist not only technical attacks, but also
coercion Coercion () is compelling a party to act in an involuntary manner by the use of threats, including threats to use force against a party. It involves a set of forceful actions which violate the free will of an individual in order to induce a des ...
,
fraud In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compen ...
, and
deception Deception or falsehood is an act or statement that misleads, hides the truth, or promotes a belief, concept, or idea that is not true. It is often done for personal gain or advantage. Deception can involve dissimulation, propaganda and sleight o ...
by confidence tricksters.


Web applications

According to the ''
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
Developer Network'' the patterns and practices of security engineering consist of the following activities: * Security Objectives * Security Design Guidelines * Security Modeling * Security Architecture and Design Review * Security Code Review * Security Testing * Security Tuning * Security Deployment Review These activities are designed to help meet security objectives in the
software life cycle A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impro ...
.


Physical

* Understanding of a ''typical'' threat and the usual risks to people and property. * Understanding the incentives created both by the threat and the countermeasures. * Understanding risk and threat analysis methodology and the benefits of an empirical study of the physical security of a facility. * Understanding how to apply the methodology to buildings, critical infrastructure, ports, public transport and other facilities/compounds. * Overview of common physical and technological methods of protection and understanding their roles in deterrence, detection and mitigation. * Determining and prioritizing security needs and aligning them with the perceived threats and the available budget.


Product

Product security engineering is security engineering applied specifically to the products that an organization creates, distributes, and/or sells. Product security engineering is distinct from corporate/enterprise security, which focuses on securing corporate networks and systems that an organization uses to conduct business. Product security includes security engineering applied to: * Hardware devices such as cell phones, computers, Internet of things devices, and cameras. * Software such as operating systems, applications, and firmware. Such security engineers are often employed in separate teams from corporate security teams and work closely with product engineering teams.


Target hardening

Whatever the target, there are multiple ways of preventing penetration by unwanted or unauthorized persons. Methods include placing Jersey barriers, stairs or other sturdy obstacles outside tall or politically sensitive buildings to prevent car and
truck bombing A car bomb, bus bomb, lorry bomb, or truck bomb, also known as a vehicle-borne improvised explosive device (VBIED), is an improvised explosive device designed to be detonated in an automobile or other vehicles. Car bombs can be roughly divided ...
s. Improving the method of
visitor management Visitor management refers to a set of practices or hardware additions that administrators can use to monitor the usage of a building or site. By gathering this information, a visitor management system can record the usage of facilities by specifi ...
and some new electronic locks take advantage of technologies such as
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
scanning, iris or retinal scanning, and voiceprint identification to authenticate users.


See also

Computer-related * Authentication *
Cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic s ...
* Data remanence *
Defensive programming Defensive programming is a form of defensive design intended to develop programs that are capable of detecting potential security abnormalities and make predetermined responses. It ensures the continuing function of a piece of software under un ...
(secure coding) *
Earthquake engineering Earthquake engineering is an interdisciplinary branch of engineering that designs and analyzes structures, such as buildings and bridges, with earthquakes in mind. Its overall goal is to make such structures more resistant to earthquakes. An earth ...
*
Economics of security The economics of information security addresses the economic aspects of privacy and computer security. Economics of information security includes models of the strictly rational “homo economicus” as well as behavioral economics. Economics of ...
* Engineering Product Lifecycle * Explosion protection *
Password policy A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part o ...
* Secure coding * Security hacker * Security pattern * Security Requirements Analysis *
Security testing Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing the security testin ...
* Software cracking * Software security assurance *
Systems engineering Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design, integrate, and manage complex systems over their life cycles. At its core, systems engineering utilizes systems thinki ...
* Trusted system Physical *
Access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
* Authorization * Critical infrastructure protection * Environmental design (esp.
CPTED Crime prevention through environmental design (CPTED) is an agenda for manipulating the built environment to create safer neighborhoods. It originated in America around 1960, when urban renewal strategies were felt to be destroying the social fram ...
) * Mantrap *
Physical security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Phy ...
* Secrecy * Secure cryptoprocessor * Security through obscurity Misc. Topics * Full disclosure (computer security) * Security awareness * Security community * Steganography *
Kerckhoffs's principle Kerckhoffs's principle (also called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by Dutch-born cryptographer Auguste Kerckhoffs in the 19th century. The principle holds that a cryptosystem should be se ...


References


Further reading

* * * * * * *


Articles and papers


patterns & practices Security Engineering on Channel9

patterns & practices Security Engineering on MSDN

patterns & practices Security Engineering Explained

Basic Target Hardening
from the Government of South Australia {{DEFAULTSORT:Security Engineering