Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

There are many different majors that relate to cybersecurity, many of which you probably wouldn’t have guessed. However, for this journal I will be addressing the more commonly known aligned majors that are offered at ODU. One major that is related to Cybersecurity is Information Technology or IT for short. The Information Technology Association of America or ITAA for short has defined IT as “the study, design, development, implementation, support or management of computer-based information systems particularly software applications and computer hardware.”  Based on this definition IT directly relates to Cybersecurity because Cybersecurity is the protection of computer-based software applications and computer hardware; IT builds and develops it while Cybersecurity protects and maintains it. Another major that relates to Cybersecurity is Computer Science. “Computer Science is the study of phenomena related to computers.” (Newell, Perlis, and Simo, 1967) Based on this definition this relates to Cybersecurity because they both deal with phenomena related to computers. However, Cybersecurity tries to interrupt or prevent the negative phenomenon that happen for example a cyber-attack on a bank while Computer Science studies them. One major that relates to Cybersecurity that might not be as known would be Engineering. Some types of engineers that align with Cybersecurity would be computer engineers, electrical engineers, systems engineers, and simulation engineers. This is because the things that they build must be protected by Cybersecurity in order to meet regulation requirements and safety standards. Another major that relates to Cybersecurity that might not be commonly known is Criminal Justice / Criminology. In fact, Criminology even has its own subclass or concept relating directly to Cybersecurity. It is called Cybercriminology; defined and coined as “the study of causation of crimes that occur in the cyberspace and its impact on physical space.” by Jaishankar (2007) This is very important in cybersecurity as it helps develop and shape the plans to protect cyberspace.