Journal 2

Because of the growth of computers and technology, cybersecurity is related to many different fields in society. Computer Science focuses on how computers work and developing software for computers that are often used by people. Software is not inherently smart as it will do whatever you instruct it to do, right or wrong. This is because software is written by people to do whatever we logically desire. For example, a hacker could find a vulnerability in a piece of software and use it to steal data from it or run other malicious programs. This is why developers and security professionals often work together to ensure there is protection against attacks like these. Knowing how computers work and how different scripting languages work will aid security professionals in securing their networks and assets. The same is true for developers because they can follow strict programming guidelines in order to prevent vulnerabilities being found in their code. Another major that is closely related with cybersecurity is criminology. Criminology focuses on why crime happens including its patterns and motives. Most major security attacks are criminal offenses as systems can suffer damage and private information can be stolen. As a cybersecurity professional it is important we figure out what the attacker’s motive is, such as monetary gain or activism. Business and cybersecurity go hand in hand because businesses hold sensitive information for them and their customers. For example, trade secrets should never be disclosed outside the company because their competitors can directly benefit from knowing them. This information is usually protected through legal documents that are signed during onboarding and must be followed even when an employee leaves the company. In addition, management information systems is closely related to cybersecurity as well. Managing factors of your local network of computers such as login details is important for protecting your company. Computers must also be up to date to protect against discovered vulnerabilities. An often overlooked vector of security is the internal users and this can be managed by the principle of least privilege. Internal users should only have the necessary permissions to perform their job and should also be trained on how to use their computers in a safe manner. 

Leave a Reply

Your email address will not be published. Required fields are marked *