Content deleted Content added
No edit summary |
|||
Line 1:
'''Security engineering''' is a specialized field of [[engineering]] that deals with the development of detailed engineering
In one form or another, Security Engineering has existed as an informal field of study for several centuries. For example, the fields of [[locksmithing]] and [[security printing]] have been around for many years. at [[US$]]150 billion.<ref>{{cite news | title=Data analytics, networked video lead trends for 2008 | publisher=CLB MEDIA INC | url =http://www.sptnews.ca/index.php?option=com_content&task=view&id=798&Itemid=4 | work =SP&T News | accessdate = 2008-01-05 }}</ref>
Security engineering involves /p/articles/mi_m1216/is_n5_v181/ai_6730246]
Some of the techniques used, such as [[fault tree analysis]], are derived from [[safety engineering]].
Line 19 ⟶ 17:
* [[CISSP]]
However, multiple qualifications, or several qualified persons working together, may provide a more complete solution.[http://www.asla.org/safespaces/pdf/design_brochure.pdf]
1 '''Default deny''' - "Everything, not explicitly permitted, is forbidden"
::Improves security at a cost in functionality.
Line 31 ⟶ 25:
::Allows greater functionality by sacrificing security.
::This is only a good approach in an environment where security threats are non-existent or negligible.
::See [[computer insecurity]]
* [[Physical security]]
:*deter attackers from accessing a facility, resource, or information stored on physical media.
Line 52 ⟶ 35:
==Methodologies==
Technological advances, principally in the field of [[computer]]s, have now allowed the creation of far more complex systems, with new and complex security problems. Because modern systems cut across many areas of human endeavor, security engineers not only need consider the mathematical and physical properties of systems; they also need to consider attacks on the people who use and form parts
* Security Objectives
* Security Design Guidelines
Line 68 ⟶ 48:
===Physical===
* Understanding of a
Whatever the target, there are multiple ways of preventing penetration by unwanted or unauthorised persons. Methods include placing [[Jersey barrier]]s, stairs or other sturdy obstacles outside tall or politically sensitive buildings to prevent car and [[truck bombing]]s. Improving the method of [[Visitor management]] and some new electronic [[Lock (device)|locks]] take advantage of technologies such as [[fingerprint]] scanning, iris or [[retinal scan]]ning, and [[voiceprint]] identification to authenticate users.
Line 81 ⟶ 54:
* US Department of State, [[Bureau of Diplomatic Security]] (ABET certified institution degree in engineering or physics required)<ref>http://careers.state.gov/specialist/opportunities/seceng.html</ref>
▲Some criticize this field as not being a bona fide field of engineering because the methodologies of this field are less formal or excessively ad-hoc compared to [[Engineering|other fields]] and many in the practice of security engineering have no engineering degree. Part of the problem lies in the fact that while conforming to positive requirements is well understood; conforming to negative requirements requires complex and indirect posturing to reach a [[Closed-form expression|closed form]] solution. In fact, some rigorous methods do exist to address these difficulties but are seldom used, partly because they are viewed as too old or too complex by many practitioners. As a result, many ad-hoc approaches simply do not succeed.
==See also==
Line 98 ⟶ 69:
* [[Electronic underground community]]
* [[Explosion protection]]
* [[Information Systems Security Engineering]]
* [[Password policy]]
Line 111 ⟶ 81:
{{col-break}}
'''Physical'''
* [[Access control]]* [[Physical Security]]
* [[Secrecy]]
* [[Security]]
Line 126 ⟶ 90:
{{col-break}}
'''Misc. Topics'''
* [[Deception]]* [[Steganography]]
* [[Social engineering (computer security)|Social engineering]]
* [[Kerckhoffs' principle]]
Line 145 ⟶ 104:
| url = http://www.cl.cam.ac.uk/~rja14/book.html
}}
*{{cite
▲* Ross Anderson (2001). "[http://www.acsa-admin.org/2001/papers/110.pdf Why Information Security is Hard - An Economic Perspective]"
<!--
*{{Conference reference
Line 175 ⟶ 126:
| year = 2000
| title = [[Secrets and Lies: Digital Security in a Networked World]]
| publisher = Wiley | author = [[David A. Wheeler]]
| year = 2003
| url = http://www.dwheeler.com/secure-programs
Line 188 ⟶ 135:
===Articles and Papers===
* [http://channel9.msdn.com/wiki/default.aspx/SecurityWiki.SecurityEngineering patterns & practices Security
* [http://www.capitalprograms.sa.edu.au/a8_publish/modules/publish/content.asp?id=23343&navgrp=2557 Basic Target Hardening] from the Government of South Australia
|