E Portfolio #2

There are multiple majors offered at Old Dominion University that can be related to cybersecurity in some way or another. These majors can be related to cybersecurity in several ways. The first major that could be very closely related to cybersecurity is Information science. Information science deals a lot with technology and information which is exactly what cybersecurity deals with. Information science deals with storing, retrieving, organizing, and providing information to others. It also looks at how information is stored and how can it be protected. Cybersecurity focuses on safety with technology so these two majors can be very closely related. Information Technology is another major that can be related to cybersecurity. Information Technology focuses on the study, design, development, etc.… of computer-based information systems. It is important for people in cybersecurity to know the development of software, so they know how to protect it and ensure its safety. Info security has four important functions, and they are protection for function, safe operation of applications, protection of data, and safeguarding the technology. These are all ways of protection that can be used in cybersecurity and information technology which makes these two majors closely related. A third major that can be related to cybersecurity is victimology. Victimology is the study of the victim and society’s responses. This can be used in cybersecurity because when it comes to victims of cybercrimes most of them don’t even know what is happening to them. Victimology can be helpful when it comes to cybersecurity. The final major that can be related to cybersecurity is computer science. This is very closely related because they both deal with technology and can be useful to each other. Computer science is the study of phenomena related to computers and cybersecurity is a phenomenon related to computers so that makes these two majors interrelated. All of these majors are very similar to each other but do have different aspects to them but they all have in common that they can be related to cybersecurity.

Leave a Reply

Your email address will not be published. Required fields are marked *