Journal #1

When posed with the question, “how does my major relate to cybersecurity technology,” the answer at first seemed clear. While attending Old Dominion University, I am pursuing a Bachelor of Science in Cybersecurity. I am currently in my senior year of this journey. Through seeking this degree, I am able to concentrate almost entirely upon furthering my knowledge in cybersecurity technology. Old Dominion University offers this major in order to provide the coursework necessary to be proficient in protecting computer systems, networks, and online data from attack and compromise. The program allows students to troubleshoot and identify security lapses both through in-class exercises and research projects.

Upon reflecting further upon the prompt, I decided to delve more into how achieving completion of a degree in Cybersecurity from this university will help me to achieve my goal of becoming employed as a cyber intelligence threat analyst. As an intelligence analyst, it would be necessary to make predictions about future cyber threats based on previously known information, as well as collecting new information about internet based malware referencing criminal activity and those involved. I am interested in pursuing a career as an intelligence analyst because it allows me the ability to combine my current skillset in law enforcement with the skills I am acquiring through pursuing a degree in cybersecurity from Old Dominion University. Cyber intelligence threat analysts protect homeland security through defense and intelligence. As the ease of access to available information via the internet increases, as does the need for dedicated individuals to protect information and evaluate changing attacks and compromises.

By integrating my current background in law enforcement with the education I am receiving at Old Dominion University, I believe I will be able to find success within the cybersecurity domain. I hope to be able to provide an integral part of providing security to our nation through working in the field of cybersecurity affording protection to sensitive information.

Leave a Reply

Your email address will not be published. Required fields are marked *