security engineering
{{Short description|Process of incorporating security controls into an information system}}
{{refimprove|date=June 2017}}
Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the system's operational capabilities.{{Cite web|title=Security Engineering - an overview {{!}} ScienceDirect Topics|url=https://www.sciencedirect.com/topics/computer-science/security-engineering|access-date=2020-10-27|website=www.sciencedirect.com}} It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy pre-defined functional and user requirements, but it has the added dimension of preventing misuse and malicious behavior. Those constraints and restrictions are often asserted as a security policy.
In one form or another, security engineering has existed as an informal field of study for several centuries. For example, the fields of locksmithing and security printing have been around for many years. The concerns for modern security engineering and computer systems were first solidified in a RAND paper from 1967, "Security and Privacy in Computer Systems" by Willis H. Ware.{{Cite web|url=https://www.rand.org/pubs/papers/P3544.html|title = Security and Privacy in Computer Systems|date = January 1967|last1 = Ware|first1 = Willis H.}} This paper, later expanded in 1979,{{Cite web|url=https://www.rand.org/pubs/reports/R609-1.html#fnb2|title = Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security|date = January 1979|last1 = Ware|first1 = Willis H.}} provided many of the fundamental information security concepts, labelled today as Cybersecurity, that impact modern computer systems, from cloud implementations to embedded IoT.
Recent catastrophic events, most notably 9/11, have made security engineering quickly become a rapidly-growing field. In fact, in a report completed in 2006, it was estimated that the global security industry was valued at US $150 billion.
Security engineering involves aspects of social science, psychology (such as designing a system to "fail well", instead of trying to eliminate all sources of error), and economics as well as physics, chemistry, mathematics, criminology architecture, and landscaping.{{cite news|url=http://findarticles.com/p/articles/mi_m1216/is_n5_v181/ai_6730246 |archive-url=https://archive.today/20120718154110/http://findarticles.com/p/articles/mi_m1216/is_n5_v181/ai_6730246 |url-status=dead |archive-date=2012-07-18 |work=Sunset |title=Landscaping for security |year=1988}}
Some of the techniques used, such as fault tree analysis, are derived from safety engineering.
Other techniques such as cryptography were previously restricted to military applications. One of the pioneers of establishing security engineering as a formal field of study is Ross Anderson.
Qualifications
No single qualification exists to become a security engineer.
However, an undergraduate and/or graduate degree, often in computer science, computer engineering, or physical protection focused degrees such as Security Science, in combination with practical work experience (systems, network engineering, software development, physical protection system modelling etc.) most qualifies an individual to succeed in the field. Other degree qualifications with a security focus exist. Multiple certifications, such as the Certified Information Systems Security Professional, or Certified Physical Security Professional are available that may demonstrate expertise in the field. Regardless of the qualification, the course must include a knowledge base to diagnose the security system drivers, security theory and principles including defense in depth, protection in depth, situational crime prevention and crime prevention through environmental design to set the protection strategy (professional inference), and technical knowledge including physics and mathematics to design and commission the engineering treatment solution. A security engineer can also benefit from having knowledge in cyber security and information security. Any previous work experience related to privacy and computer science is also valued.
All of this knowledge must be braced by professional attributes including strong communication skills and high levels of literacy for engineering report writing. Security engineering also goes by the label Security Science.
Related-fields
:*See especially Information security and Computer security
:*protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption to access.
:*deter attackers from accessing a facility, resource, or information stored on physical media.
:*the economic aspects of economics of privacy and computer security.
Methodologies
Technological advances, principally in the field of computers, have now allowed the creation of far more complex systems, with new and complex security problems. Because modern systems cut across many areas of human endeavor, security engineers not only need consider the mathematical and physical properties of systems; they also need to consider attacks on the people who use and form parts of those systems using social engineering attacks. Secure systems have to resist not only technical attacks, but also coercion, fraud, and deception by confidence tricksters.
=Web applications=
{{Main|Web security}}
According to the Microsoft Developer Network the patterns and practices of security engineering consist of the following activities:{{cite web| url = http://msdn2.microsoft.com/en-us/library/ms998404.aspx| title = patterns & practices of Security Engineering}}
- Security Objectives
- Security Design Guidelines
- Security Modeling
- Security Architecture and Design Review
- Security Code Review
- Security Testing
- Security Tuning
- Security Deployment Review
These activities are designed to help meet security objectives in the software life cycle.
=Physical=
{{Main|Physical security}}
File:Canadian Embassy DC 2007 002.jpg
- Understanding of a typical threat and the usual risks to people and property.
- Understanding the incentives created both by the threat and the countermeasures.
- Understanding risk and threat analysis methodology and the benefits of an empirical study of the physical security of a facility.
- Understanding how to apply the methodology to buildings, critical infrastructure, ports, public transport and other facilities/compounds.
- Overview of common physical and technological methods of protection and understanding their roles in deterrence, detection and mitigation.
- Determining and prioritizing security needs and aligning them with the perceived threats and the available budget.
=Product=
Product security engineering is security engineering applied specifically to the products that an organization creates, distributes, and/or sells. Product security engineering is distinct from corporate/enterprise security,{{cite web |url=https://www.sans.org/reading-room/whitepapers/leadership/corporate-vs-product-security-34237 |title=Corporate vs. Product Security |last=Watson |first=Philip |publisher=SANS Institute |date=May 20, 2013 |website=SANS Institute Information Security Reading Room |access-date=October 13, 2020}} which focuses on securing corporate networks and systems that an organization uses to conduct business.
Product security includes security engineering applied to:
- Hardware devices such as cell phones, computers, Internet of things devices, and cameras.
- Software such as operating systems, applications, and firmware.
Such security engineers are often employed in separate teams from corporate security teams and work closely with product engineering teams.
==Target hardening==
Whatever the target, there are multiple ways of preventing penetration by unwanted or unauthorized persons. Methods include placing Jersey barriers, stairs or other sturdy obstacles outside tall or politically sensitive buildings to prevent car and truck bombings. Improving the method of visitor management and some new electronic locks take advantage of technologies such as fingerprint scanning, iris or retinal scanning, and voiceprint identification to authenticate users.
See also
{{col-start}}
{{col-break}}
Computer-related
- Authentication
- Cryptanalysis
- Data remanence
- Defensive programming (secure coding)
- Earthquake engineering
- Economics of security
- Engineering Product Lifecycle
- Explosion protection
- Password policy
- Secure coding
- Security hacker
- Security pattern
- Security Requirements Analysis
- Security testing
- Software cracking
- Software security assurance
- Systems engineering
- Trusted system
{{col-break}}
Physical
- Access control
- Authorization
- Critical infrastructure protection
- Environmental design (esp. CPTED)
- Mantrap
- Physical security
- Secrecy
- Secure cryptoprocessor
- Security through obscurity
{{col-break}}
Misc. Topics
- Full disclosure (computer security)
- Security awareness
- Security community
- Steganography
- Kerckhoffs's principle
{{col-end}}
References
{{Reflist}}
Further reading
- {{cite book |author = Ross Anderson
|year = 2001
|title = Security Engineering
|publisher = Wiley
|isbn = 0-471-38922-6
|url = https://archive.org/details/securityengineer00ande
|author-link = Ross J. Anderson
}}
- {{cite book
| author = Ross Anderson
| year = 2008
| title = Security Engineering - A Guide to Building Dependable Distributed Systems
| publisher = Wiley
| isbn = 978-0-470-06852-6
|author-link = Ross J. Anderson
}}
- {{Cite conference
| author = Ross Anderson
| year = 2001
| title = Why Information Security is Hard - An Economic Perspective
|book-title = Proc. Annual Computer Security Applications Conference
| pages =
| url = http://www.acsa-admin.org/2001/papers/110.pdf
| archive-url = https://web.archive.org/web/20061011090154/http://www.acsa-admin.org/2001/papers/110.pdf
| url-status = usurped
| archive-date = October 11, 2006
| doi = 10.1109/ACSAC.2001.991552
}}
- {{cite book
| author = Bruce Schneier
| year = 1995
| title = Applied Cryptography
| publisher = Wiley
| edition = 2nd
| isbn = 0-471-11709-9
|author-link = Bruce Schneier
}}
- {{cite book
| author = Bruce Schneier
| year = 2000
| title = Secrets and Lies: Digital Security in a Networked World
| publisher = Wiley
| isbn = 0-471-25311-1
}}
- {{cite web
|author = David A. Wheeler
|year = 2003
|url = http://www.dwheeler.com/secure-programs
|title = Secure Programming for Linux and Unix HOWTO
|work = Linux Documentation Project
|access-date = 2005-12-19
|archive-date = 2007-04-28
|archive-url = https://web.archive.org/web/20070428175037/http://www.dwheeler.com/secure-programs/
|url-status = dead
}}
- {{cite web
| author = Ron Ross, Michael McEvilley, Janet Carrier Oren
| year = 2016
| url = http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160.pdf
| title = Systems Security Engineering
| work = Internet of Things
| access-date = 2016-11-22
}}
=Articles and papers=
- [http://channel9.msdn.com/wiki/default.aspx/SecurityWiki.SecurityEngineering patterns & practices Security Engineering on Channel9]
- [http://msdn.com/SecurityEngineering patterns & practices Security Engineering on MSDN]
- [https://web.archive.org/web/20060622155933/http://msdn.microsoft.com/library/en-us/dnpag2/html/secengexplained.asp patterns & practices Security Engineering Explained]
- [https://web.archive.org/web/20070829200622/http://www.capitalprograms.sa.edu.au/a8_publish/modules/publish/content.asp?id=23343&navgrp=2557 Basic Target Hardening] from the Government of South Australia
{{Engineering fields}}
{{DEFAULTSORT:Security Engineering}}