Journal 2

There are many majors that implement cybersecurity or contribute to cybersecurity at Old Dominion University. Some of these majors include accounting, computer science, aerospace engineering, and digital marketing. With accounting, a person who graduates and seek employment at a bank will encounter cybersecurity in their job. For example, the transactions made are secured with encryption that prevents others from tampering with the funds. Also, if someone manages to make a purchase on a stolen credit card, the bank can cancel the purchase and refund it when the owner notifies the bank. Additionally, taxes that are filed go directly to the IRS and the information becomes stored on its servers, which are protected by strong encryption. Next, a student in computer science can manage cybersecurity with the creation of software and apps. For example, a person who makes a social media platform will make sure that he/she uses a trusted third-party server to host the database of the app and asks for permission before being able to access the camera and microphone, keeping a user’s information private from being uploaded to the internet. Furthermore, there are many password generators that numerous apps implement to help create a strong password for the person and remember it for him/her to reduce the need to re-enter it. Then, aerospace engineering is another major that relies on cybersecurity to successfully launch satellites. With each satellite, there are supercomputers that keep track of the satellite’s orbit and connection to make sure that the satellite does not go offline or exhibit mechanical errors. Also, the packets that are sent from the rover to the transmitters on Earth are encrypted to allow the information to be safely broadcasted and stored on the backup servers as a precaution for signal loss. Finally, digital marketing employs the use of cybersecurity through the promotion of advertising. Social marketers create posts that inform and encourage subscribers to become conscious of their privacy online such as using two-factor authentication, using an antivirus to scan for viruses, and sticking to incognito mode to prevent ISPs from identifying the person by his/her device.

Leave a Reply

Your email address will not be published. Required fields are marked *