Journal #1

My major is Cybersecurity; therefore, cybersecurity technology is an imperative component to my major if not my major entirely. Cybersecurity involves the process of protecting networks, devices, data, etc. from attacks or breaching through bodies of technology. This is essentially what cybersecurity technology is as well.

Computer Science encompasses Cybersecurity completely due to its comprehensive nature. Computer Science involves the entirety of computers and computing. So much so that Cybersecurity was created as a subset of Computer Science as to have a field of study that was less widespread and narrower and more focused.

Though Information Technology (IT) is related to Cybersecurity, they have enough differences that divide them into their own subsets. While Cybersecurity is about protecting electronic data, IT involves the implementation of new technology and maximizing electronic performance.  However, both heavily involve programming, networking, and aiding in computer incidents. They are also both dependent on each other for modern-day technology to function accordingly.

Computer Engineering integrates Engineering as well as Computer Science but its relation to Cyber Security is based on dependence. Computer Engineering involves designing and developing computer systems and technological devices. It is the goal of Cyber Security to protect the information that is transmitted between these devices through the network, but Cybersecurity also depends on Computer Engineering to have the software that enables Cybersecurity specialists and information security analysts to protect said networks.

Cyber Operations and Cybersecurity seem identical t first glance. However, while they both deal with the ways businesses and governing bodies go about technological maneuvers, where they differ is their focus. Cybersecurity focuses more heavily on defense. It involves detecting risks and threats and protecting networks and data through ways of guarded protection. Cyber Operations focuses more on offense. It involves the study and exploitation of opponents and ways of protection through attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *