1. Computer Science is related to cybersecurity because all Cybersecurity applications are programs built and maintained by Computer Science. For instance, Red Hat was made using python. Secondly, Cybersecurity is a subset of computer science instead of creating new programs as you would in Computer Science, cybersecurity protects them from being hacked. Thirdly, many Computer Science tools are used to aid Cybersecurity efforts like Red Hat and Ubuntu virtual machines which are written in Python and C++ respectively.
2. Computer Engineering is related to cybersecurity through the creation and management of Cybersecurity programs in the same way Computer Science is. For example, a computer engineer could create brand new software, hardware, or tool that a cybersecurity analyst could use to defend a network and devices from malware, brute force attacks, and ransomware. Lastly, Computer Engineers maintain the servers, systems, and networks that cybersecurity specialists protect and defend from malicious attacks.
3. Criminal Justice is related to Cybersecurity because it deals with the legal and statutory side of cybersecurity. For example, if someone is caught hacking into a network or system unethically. Then they could be sued and a criminal justice major could prosecute or defend the defendant in court for cybercrime charges. People that work in criminal justice and specialize in Cybersecurity can investigate Cybercrimes to find the culprit, how they hacked into a system, and which laws they broke.
4. Database Administration (Information Systems & Technology) is related to Cybersecurity because they administrate and update the very databases that Cybersecurity professionals are tasked with defending. Moreover, they work on database projects that can update, refine, and rearrange databases which can facilitate the protection of the data found within the database. Since database Administration is a specialty within the IT field the same way Cybersecurity is many of the same concepts of Cybersecurity are found in Data base administration.
Leave a Reply