ePortfolio assignment one

This week, we’re tasked with writing responses to the following questions:

  1. How does [my] major relate to cybersecurity technology?
  2. Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

Before I answer these questions, I think it is important to establish a baseline definition of cybersecurity. For this definition, I choose the one provided by the Week 1 reading from the Technology Innovation Management Review:

Cybersecurity is the organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign de jure from de facto property rights.

Craigen, Diakun-Thibault, and Purse (2014).

I chose this definition because, in the article, the authors demonstrate how institution-specific definitions of cybersecurity map to the more general definition they have provided. I will duplicate this technique in my responses to the questions.

Question 1

My major is Bachelor of Science in Cyber Operations. The definition of this major provided by ODU is

Cyber Operations is an interdisciplinary major encompassing the entire scope of cyberspace and related operations that are both technical and non-technical (i.e., ethical, legal, human-centered, etc.) in nature. Cyber Operations is a complementary discipline to Cybersecurity. Cyber Operations places a particular emphasis on technologies and techniques applicable to all operational and system levels. Coursework in Cyber Operations balances theory, practice and hands-on labs inspired by real-life scenarios. Skills and competencies emphasized are in system attack, infiltration, exploitation, defense, mitigation, and recovery.

Old Dominion University, “Cyber Operations (B.S.)”. https://www.odu.edu/academics/programs/undergraduate/cyberoperations (last updated 4/4/2021; last access 10/21/2021)

In the table below, I will map a few key terms from the definition of my major to the conceptual categories which comprise the definition from Craigen, et. al.

Key TermConceptual Category
“entire scope of cyberspace”Asset
“technologies and techniques”Resource(s)
“defense, mitigation, and recovery”Protect
Mapping Key Terms to Conceptual Categories

The table above illustrates that there are three phrases from ODU’s definition of Cyber Operations major which correspond to Conceptual Categories pertaining to the definition of cybersecurity provided by Craigen, et. al. Therefore, my major is related to cybersecurity technology.

Question 2

  1. B.S. in Computer Engineering: This program teaches (among other things) the design and synthesis of computer circuits, like those used in computer chips. This knowledge is useful in cybersecurity for an understanding of the physical aspects of how computers and computer networks work. For example, a malicious actor could deliberately introduce a flaw into a computer chip that would cause the failure of a critical component in an important piece of hardware, say, in a power generating station.
  2. B.S. in Computer Science: Students in this program learn the skills and techniques to develop software. Malicious actors could use this knowledge to introduce backdoors or other malicious programs into major software releases. The degree description also indicates that students learn about “information security analysis,” which is a component of cybersecurity.
  3. The Strome School of Business offers a Bachelor of Science in Enterprise Cybersecurity (Information Systems & Technology). This degree “emphasizes programming, business analysis, networking, enterprise architecture and cyber defense skills.” This, to me, is clearly and directly related to the field of cybersecurity.
  4. Bachelor of Science in Database Administration: To me, Database Administration relates to cybersecurity through the CIA triad: Database administrators will manage huge amounts of potentially confidential data, such as personally identifiable information (PII) or confidential information, for one or many companies. Database Administrators must ensure information is accurate and accessible by those with the need to know, whenever the information is needed.

Leave a Reply

Your email address will not be published. Required fields are marked *