Security Engineering For Everyone Analysis

Superior Essays
Security – Engineering for Everyone!
Corporations in all sectors share a common goal: to make money. This is not an eye opening statement, but the following might be: “Corporations in all sectors share a common theme – they barely (if ever) care about security.” While some reading this may simply stop at that statement and whisper “he is insane,” many tasked with information security would wholeheartedly agree with me after reading this in its entirety.

During my thought process while writing this, I kept remembering a common statement from many clients, peers, and readings about the topic of the security: “Management doesn’t care. Security is not in the budget… they don’t get it.” This train of thought repeats in many of the articles I write
…show more content…
I blame the IT engineers workers. Imagine for a moment you are going to work. You get in your car, then take the train to your office. When you arrive, you walk up an escalator or take an elevator to the thirteenth floor. On the way to work, your car breaks down out of the blue, or the train stops. The escalator? Well it starts going backwards, or the elevator just drops mid-way through the trip. Would you be upset? Would you file a lawsuit? Why is it that when your vendors fail you (the company you do business with) during a breach, that you simply shrug it off? The engineer should have brought it to management’s attention: “Hey this is a subpar thing we’re doing here.” This is what engineers do. IT workers? Usually, the tail goes between the legs, little is said. [6]

Engineering [7] was once a profession, but now engineers come a dime a dozen, in fact, many are coming right out of grade school. Everyone is an engineer, yet no one is building anything worthwhile. Firewalls, Intrusion Prevention Systems, Data Loss Prevention Systems, as my manager would say: “Bunkeeyon Debunkulators.” Security has become a used car lot, a real-life Field of Dreams: “if you build it they will come” where many security hardware, and software vendors are often snake oil salesman delivering to
…show more content…
Management doesn’t get it, because their staff hasn’t made the business case. Awareness is lacking, from all walks of the organization. Not just from the upper level managers, but more importantly from the “engineering” staff. Now many readers overlooked the “everyone would need to enter a password” statement in the last paragraph, and many would have been content with just locking the said printer away in Fort Knox. The IT staff, they won’t bring up creating passwords for a printer, because that would require more work. Bigger locks would not stop someone from remotely accessing that printer, so the security becomes a moot point. However, having a different set of eyes can enable organizations to clear up security tunnel

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Twin Towers Summary

    • 843 Words
    • 4 Pages

    Abbot’s book provides an analysis of the history of the Twin Towers along with a brief overview of its structure and design. It explains how the towers came to be targeted by the terrorist group Al Qaeda. It also describes the events leading up to the attack, including how the Al Qaeda developed its anger towards America. As well the book looks at the effects of 9/11, how the attack has shaped the country, and how it is remembered today.…

    • 843 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Target Security Breach

    • 181 Words
    • 1 Pages

    From a managerial perspective, there were many errors made in handling the December 2013 Target security breach. The first questionable decision for review deals with the effects of poor communication. Chief Executive Gregg Steinhafel hesitates to publicly communicate the breach to consumers (Kinicki & Williams, 2013). The primary law of business is “being responsive to customers” (Kinicki & Williams, 2013, p.12). Furthermore, when the details were communicated, CEO Steinhafel inflated the amount of affected shoppers (Kinicki & Williams, 2013).…

    • 181 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In today’s world, nobody really pays attention to the contemporary surveillance that takes places in everyday life. In 2002, the Homeland Security Act was put in place, in result of the September 11 attacks in 2001 (“ Homeland Security Act of 2002”). So with that, security…

    • 1550 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As part of the Homeland Security Assessment process, organizations strive to align their business plan with a Homeland Security Assessment by using the Baldridge Criteria model to “ensure that their performance excellence and security is competitive in the global marketplace which is one way that the Homeland Security Assessment process follows the Council on Competitiveness Business Model” (Fisher, 2004). “The Council on Competitiveness is a nonpartisan, non-profit organization whose members consist of corporate chief executives, university presidents, and labor leaders that are dedicated to setting an action agenda to drive the United States economic competitiveness by concentrating on a few critical issues, including national and regional…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Security Scenarios

    • 492 Words
    • 2 Pages

    Our team is well versed in the Security Operations and has the expertise to provide the required functional and administrative security support to NSWCDD as well as fleet support to DNA through the use of dedicated clerical and administrative support staff. With over twenty years of experience Zenetex continues to provide an extensive variety of complex security services in accordance with, and in support of, applicable local and national security policies and directives across numerous active contracts. This experience which spans across a wide spectrum of security levels and accesses which would be adapted and used to develop and maintain requisite operating procedures beyond and inclusive of those provided with the POA&M. Section C.4.1.1…

    • 492 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NSA’s Mass Surveillance. Is it worth it? NSA’s Mass Surveillance. Is it worth it?. - 1 Annotated Bibliography Barnhizer, D. (2013)…

    • 3666 Words
    • 15 Pages
    Improved Essays
  • Improved Essays

    However, these same technological advancements have a history of bringing fear, social injustices, and larger economic crashes to the same populace; technology gives Americans the opportunity to help or hurt, and the two are not mutually exclusive. While human nature is very difficult to change, keeping the malicious potential of cutting edge technology is paramount to ensuring a safe and prosperous future for all Americans and the world…

    • 966 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Similarly, safety measures can only protect Americans so much. In the events of 9/11, safety measures would have done very little to protect the lives of people lost. Even with the National Security Agency (NSA), the event would have been nearly impossible to defend against. The NSA continually intrudes on privacy and limits freedom, yet has minimal to zero success in protecting Americans. The inability for America’s top specialists to protect…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Wasting money, time, effort and resource. If the organization security policy framework does not align with their objectives, the employees may try to find something else to help their security control, not using the current framework. Consequences when the framework doesn’t meet the requirements of organizational needs are they generally invest some money to…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Hennigan, W. J., Paresh Dave, and Tracey Lien. “Obama Raises Pressure on Silicon Valley in Terror Fight.” Times 9 Jan. 2016: A.1. SIRS Issues Researcher. Web.…

    • 1264 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays

Related Topics