Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
- Computer science
Computer science is probably the closest related major to cybersecurity. Both fields work very closely together with a strong relationship; computer science works with the nature of computers and technology, while cybersecurity works to protect it and keep it intact. Both majors are crucial for each others’ survival and functionality.
2. Nursing
Nursing should also be an obvious major that is closely tied to cybersecurity; nursing and other medical fields work with databases every second to keep patients’ information, vaccine information, etc. intact. HIPAA, the The Health Insurance Portability and Accountability Act, makes it illegal for patients’ sensitive medical information such as blood type to be openly distributed without their knowledge or consent. With cybersecurity, it’s easier to fulfill this act and keep information out of the wrong hands.
3. Business
Business as a major is related to cybersecurity with similar purpose as nursing; databases are integral to keeping things in place. Businesses in general are a big source of employers for cybersecurity majors, as companies and businesses obviously don’t want their information being compromised.
4. Political Science
By far one of the most important fields that utilize cybersecurity, malicious hackers and data leaks are prevalent in a political setting. Many government officials are exposed by their emails and communications with other countries due to information getting into the wrong hands due to a weak cybersecurity structure. It is extremely necessary for today’s politicians to be up to date on technology and various hacking methods.
What have we learned from this analysis?
Almost every major works closely with virtual databases. With how progressive society is becoming and embracing the growth of technology, almost all information is backed up on company databases or clouds. As such, cybersecurity is necessary for almost every field. Without it, sensitive information is easily compromised and nothing could be kept a secret; any information available would be open to anyone to see.