Journal #1

As a student majoring in cyber operations, cybersecurity technology relates to my intended major through its association with cyberspace. Cybersecurity technology is one of the foundations that make up why cyber operations exists. Since cybersecurity is a practice and process of protecting networks and computer data and programs, cyber operations are then allowed to execute to protect and mitigate threats. Cyber operations operate when any computer technologies are under cyberattack through the means of various hacking techniques. Any information stored and run in cyberspace is always at risk of security. Hence, any cyber technologies are tools, or even weapons, that are used to access, legally or illegally, data in computers and networks. One of the biggest problems in cyber technologies are cyber threats and attacks that is occurring every second of everyday. Threats and attacks may occur locally, nationally, or internationally and hacking techniques are only becoming even more complex and sophisticated. Thus, cybersecurity technologies are utilized and operated by cyber operations and they can only make their protection even more sophisticated and strategic. Ensuring cybersecurity takes extensive training and education for those pursuing the cyber career field. Real life experience to be able to control and manipulate computer technologies, critical thinking and never-ending process of learning about cybersecurity are only the fundamental requirements. The field of cyber operation is a continuous improving field that depends on the full capability and knowledge of the individuals behind the screen. Moreover, the significance of cybersecurity ranges from the most confidential piece of information to the texts or emails that are being sent every day. The vulnerability of any and all information is why cyber operations and technologies are critically applied to ensure security and protection of most of all information, especially those sensitive and confidential.

Leave a Reply

Your email address will not be published. Required fields are marked *