Blog

How does your major relate to cybersecurity technology?

Cybersecurity technology simply involves technology that helps assist with cyber attacks. This precaution is a set of tools, different technologies, and a lot of training, designed to protect various programs, devices and data from hackers. In this society, its become very hard to go through life without the use of technology. We store our lives on our computers, phones, etc. Various businesses, offices use technology to store their financial plans and other important documents. 

To start of my major is criminal justice. There are many department within my major that relate to cybersecurity. There are departments such as homeland security, IT, and many more that require special cybersecurity technology.  When it comes to the department of homeland security, that is a top security department that many people want to hack. Hackers are very intelligent people, 

they hack into systems to gather important information like peoples bank account information, also they try to hack important government documents. Within the government, they have special protection barriers in their buildings and even on the computers. The employees who use the computer have to go through special protocols when they are in use to protect government information. My major relates to cybersecurity technology based on the high end protection in different departments for security purposes. As the modules went on I discovered that criminal justice had something in common with the NSIT Framework strategy. The NIST came up with 5 core activities of framework which consisted of: recover, identify, protect, detect, and respond. First we look at identify, this involves using risk assessments and risk management strategy. This means each organization has their own set of strategy’s that help their employees be aware of the the types of cyber attacks, and how to deal with them. Also, they use identification, evaluations, and prioritize, to minimize the chances of cyber attacks. Protect is more of the simpler protocols. This includes awareness and training, protective technology, and data security. In other words they are training employers to be able to identify cyber attacks. They also have the use of protective technology as another way to minimize the cyber hackers to get into important data and information. Detect involves detection processes, continuous security process. It doesnt get any simpler than that. They use monitoring to simply detect when hackers are attempting to hack into a system. As far as the detection process, they have a certain way on detecting attacks, and their own way of handling it. Next on the list is responding. This includes response planning, analysis, and improvements. In this category, an organization will look to always improve their cyber security software by constantly upgrading computers, software and protection protocols. The response planning require employees to follow a specific set of rules to follow in the case of a cyber attacks. Last but not least, we get to recover. Includes improvements, communications and recovery planning. This means that each organization uses communications to detects cyber hackers or data breaches. Of course software’s will always have to have improvements to make sure the data is up to date for the highest amount of security for devices and software’s. 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.