Class Work Application in Work Environments
On daily basis, the national infrastructure hugely relies on computers, software, and network-related applications to create, accumulate, analyze, and catapult decisions using huge quantities of available data. The increase in dependence rate is as a result of infrastructural attacks like facility bombing, cut cables, tampering with equipment, and the major 9-1-1 attack in the United States (Edward, 2011). Software engineers, therefore, have a significant role to play in ensuring safety of their organizations and the national infrastructure at large. As a software engineer, I am looking forward to working in an organization capable of identifying, preventing, and managing viruses, leaks, worms, and any other intrusions that would halt organizational performance or lead to loss of data. By safeguarding my organization, I would be indirectly safeguarding the national infrastructure.
Mitigating attacks will commence after identifying the probable vulnerabilities and threats directed towards our organization. Kroll (2019) argued that such loop-holes within a security system would lean on the unpatched software within our system, inferior intranet and local area networks, impoverished equipment, and exploitable bugs in the system (Steven, 2019). In dealing with such malicious attacks, the organization would be borrowing security concepts gained from this course including deployment of firewalls, passwords, unauthorized access detectors, encrypting data, and the use of scanners.
Nevertheless, it is likely that these conventional techniques wouldn`t be efficient enough due to the dynamism in size, scope, and scale of our organizational data and related entities. As such, I would recommend the organization to formulate a team of experts who would conduct an extensional research, borrowing the course`s basic concepts, to propose advanced infrastructures. Such infrastructures will manage the enormous data volumes which would be exceeding the processing and storage capacities of the ordinary organization`s security tools. According to Amoroso (2011), alike systems would require a combination of enormous organizational challenges with satisfactory existing network and computer security techniques to effectively and efficiently safeguard the organizations entities (Edward, 2011).
Testing those infrastructures will be commendable for detection of weaknesses and possible entry points by attackers. The testing process will take comprise three entities namely hackers, trusted individuals from the inside, and organization`s partners. Some hackers will get paid to conduct test attacks so that the experts can identify infrastructural areas to batten. Likewise, software elite individuals from the inside as well as individuals from our partner organizations will substitute hackers` positions and try to access data without proper authorization. After identifying such areas, it will be upon the team to augment the structures to avoid similar intrusions in the future. Afterwards, connecting the security systems (both current and newly developed) to an incident response and vulnerability management systems will occur.
Finally, it will be necessary to link the software and users to the State`s cyber-crime regulations and policies for compliance. Training users and operators about the then existing policies as well as efficient ways to detect, report, or manage any present vulnerability would be noble. Such knowledge will come from the course and related references. Thus, as read from the discussion, the problem is not learning new concepts in class, but rather integrating them into the field for rapid and eminent organizational transformation. sswork