ePortfolio entry #1

We are living in a world that is advanced with technology. We cannot live our life without technology anymore and it is part of our daily life. We use technology every day and as technology advances, so does the risk of using it. People will abuse technology and use it for the bad cause like hacking into someone else’s personal data, online scamming, releasing virus into computers etc…

As someone who is majoring in cybersecurity, it is our job to learn about how the technology works in order to find the loophole and weak points in it to prevent hackers from taking advantage of it and using it for the bad. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access.

There are different types of cyber security technologies. The common types are network security, data loss prevention, cloud security, intrusion detection systems or intrusion prevention systems, identity and access management, antivirus or anti malware. The common types of cyber threats are malware, ransomware, phishing attacks, social engineering, advanced persistent threat.

The goal in my major is to keep away and protect systems, documents and valuable information away from those seeking to gaining access that is not authorized. I am trying to become an ethical hacker which is basically hacking, but in an authorized way. I would try to break into my company’s software and system to make sure that everything is well protected, sealed and that there is no way that someone could possibly break in.

The question “How does your major relate to cybersecurity technology has?” has infinite number of answers, but for me and my major, it is important learn about how the technologies work and the software’s that are out there and which could possibly harm my system. I hope to be someone that will be capable of protecting and securing our technology’s in the future.

Leave a Reply

Your email address will not be published. Required fields are marked *