{"id":325,"date":"2021-04-28T21:59:51","date_gmt":"2021-04-28T21:59:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/byeab001\/?p=325"},"modified":"2021-04-28T21:59:52","modified_gmt":"2021-04-28T21:59:52","slug":"eportfolio-entry-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-1\/","title":{"rendered":"ePortfolio entry #1"},"content":{"rendered":"\n<p><strong>1.How does your major relate to cybersecurity technology?<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-normal-font-size\">As a sophomore here at Odu I wasn\u2019t sure on what major I wanted to study, it took me a while before\u00a0I\u00a0decided\u00a0that cybersecurity\u00a0was\u00a0the major,\u00a0I wanted to\u00a0peruse.\u00a0One of the many reasons why I choose cybersecurity was because we as a society have evolved into a\u00a0technological\u00a0era,\u00a0where almost all things\u00a0such as business, schools, homes\u00a0are now\u00a0using technology such as computer, the internet, phones,\u00a0and in cases of big businesses they use even bigger technologies. Even though these technologies\u00a0are very useful and make our daily\u00a0lives\u00a0very\u00a0easy\u00a0and carry out functions in the industrial world, they are\u00a0also prone to major attacks. For example,\u00a0cyber-attack\u00a0on\u00a0company&#8217;s\u00a0and small\u00a0businesses\u00a0are among the many threats\u00a0that occur daily and cause billions of dollars annually.\u00a0As a cybersecurity\u00a0major,\u00a0I can give many examples as to how it\u00a0relates\u00a0to\u00a0cybersecurity\u00a0technology.\u00a0Cybersecurity technology basically refers to the body\u00a0of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damages, or unauthorized access.\u00a0My major\u00a0engages and teaches students how to practice and better\u00a0understand the field of cybersecurity.\u00a0This process allows students like myself to be prepared for the world of\u00a0cybersecurity. This intern molds\u00a0a new generation of people to help vulnerable businesses,\u00a0and prevent any sorts of attacks that can cause monetary damages to people.\u00a0Another way my major relates to cybersecurity technology is that it focuses on\u00a0not only computers and other technology but also laws and ethics that are part of cyber technology.\u00a0Overall, I am excited to see how far the field of cybersecurity is going to take me in life and\u00a0learn\u00a0these classes\u00a0which are all connected to cybersecurity\u00a0technology.\u00a0\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.How does your major relate to cybersecurity technology? As a sophomore here at Odu I wasn\u2019t sure on what major I wanted to study, it took me a while before\u00a0I\u00a0decided\u00a0that cybersecurity\u00a0was\u00a0the major,\u00a0I wanted to\u00a0peruse.\u00a0One of the many reasons why I choose cybersecurity was because we as a society have evolved into a\u00a0technological\u00a0era,\u00a0where almost all things\u00a0such&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-1\/\">Read More<\/a><\/div>\n","protected":false},"author":16668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/325"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/users\/16668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/325\/revisions\/326"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}