Security engineering
From Free net encyclopedia
Security engineering is the field of engineering dealing with the security and integrity of real-world systems.
Security systems engineering has existed as an informal field for centuries, in the fields of locksmithing and security printing.
Technological advances, principally in the field of computers, have now allowed the creation of far more complex systems than before, with new and complex security problems. Because modern systems cut across many areas of human endeavor, security engineers not only need consider the mathematical and physical properties of systems; they also need to consider attacks on the people who use and form parts of those systems using social engineering attacks. Secure systems have to resist not only technical attacks, but also coercion, fraud, and deception by confidence tricksters.
For this reason, as well as physics, chemistry and mathematics, it involves aspects of social science, psychology and economics. Some of the techniques used, such as fault tree analysis, are derived from safety engineering.
Other techniques such as cryptography were previously restricted to military applications.
One of the pioneers of security engineering as a formal field of study is Ross Anderson.
Contents |
Security Stance
A security stance is a default position on security matters.
Possible security stances:
"Everything not explicitly permitted is forbidden" (default deny) -- improves security at a cost in functionality. This is a good approach if you have lots of security threats. See secure computing for a discussion of computer security using this approach.
"Everything not explicitly forbidden is permitted" (default permit) -- allows greater functionality by sacrificing security. This is only a good approach in an environment where security threats are non-existent or negligible. See computer insecurity for an example of the failure of this approach in the real world.
Sub-fields of security engineering
See also
- Authentication
- Authorization
- Critical Infrastructure Protection
- Computer insecurity
- Cryptography
- Cryptanalysis
- Data remanence
- Deception
- Defensive programming
- Electronic underground community
- Fraud
- Full disclosure
- Hacking
- Kerckhoffs' principle
- Locksmithing
- Password policy
- Secrecy
- Secure computing
- Secure cryptoprocessor
- Security awareness
- Security by obscurity
- Security community
- Social engineering
- Software cracking
- Steganography
- Systems engineering
- Trusted system
Further reading
- {{cite book
| author = Ross Anderson | year = 2001 | title = Security Engineering | publisher = Wiley | id = ISBN 0471389226 }}
- Ross Anderson (2001). "Why Information Security is Hard - An Economic Perspective"
- {{cite book
| author = Bruce Schneier | year = 1995 | title = Applied Cryptography | publisher = Wiley | edition = 2nd edition | id = ISBN 0471117099
}}
- {{cite book
| author = Bruce Schneier | year = 2000 | title = Secrets and Lies: Digital Security in a Networked World | publisher = Wiley | id = ISBN 0471253111
}}
- {{cite web
| author = David A. Wheeler | year = 2003 | url = http://www.dwheeler.com/secure-programs | title = Secure Programming for Linux and Unix HOWTO | work = Linux Documentation Project | accessdate = 2005-12-19 }}