Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
Computer science, computer forensics, cryptography, and computer engineering can all draw back into cybersecurity. Computer science and cyber programs have different core curriculums, but there are many overlaps depending on the program. Both majors require general knowledge of cloud computing and networks. Generally, computer science programs focus on computing, theory, and application while cyber programs are more focused on security. Both programs require coding knowledge which draws into the cyber field for ethical hackers and infiltration testing. Both fields must excel in their knowledge of computer systems to fully grasp their degree. Those who work in computer forensics are on the front lines fighting against cybercrime. This major directly links into cybersecurity as they find ways to collect, process, preserve, and analyze computer-related evidence. They help identify network vulnerabilities and develop ways to prevent them, much like those in our major do. They work deep inside networks in search for criminal activity and run counterintelligence against cyber criminals. They also have coursework in programming, like many of us, along with ethics to prepare their technical abilities. Cryptography, on the other hand, is one of the most important tools in building secure systems. Through the usage of cryptography, one is able to protect the confidentiality of data from unauthorized modification and authenticate sources of data. Cryptographers use mathematic algorithms to shuffle information in ways only authorized users can unshuffle and obtain the data. Computer engineers are at the heart of cyber security operations. Almost every organization needs some sort of protected digital infrastructure, such as an app or website, and computer engineers are where to get them. Many of them focus on the hardware and software infrastructures that many cyber specialist work from. Without their specialized talent in engineering, many computers would not be secure enough to protect data or infiltrate data.
Leave a Reply