E-Portfolio entry #2

Select four other majors offered by ODU and explain how those majors relate to cybersecurity.

Computer Science – Computer Science used very often in the field of cybersecurity and is the study of computers which mostly consists of creating foundations, and processing data or information through hardware and software. It can also measure algorithms, create and make models of data structures which is used daily with identifying data that enters the system’s database.

Software Development – The main purpose for Software Development is uses a variety of different programming languages to help develop databases as well as to continue Maintenance such as skimming and reprogramming bugs in the software. Software development also provides the field of cybersecurity with different skills such as modifying any other software products and developing more prototypes to make the defenses better at maintaining against any breaches in cybersecurity.

Database Management – Data Management plays an important role in managing and categorizing the data into the programmed software system. Not only does it help separate and categorize the data into different groups, but the database structure is also made up and compiled into a few different frameworks. Cybersecurity uses the system to organize and identify what kinds of data belong in the database and how to manipulate the data structure according to its collected information.

Computer Programming – Computer Programing is the basics building blocks into creating a database that also makes scripts that are made up of codes to give specific commands for certain functions such as activating firewalls, authorization access for specific information categorizing, data transferring and creating a high-tech defense system to prevent hackers from invading and stealing client’s or the companies’ personal data.

Network Administration – In Cybersecurity, Network administration is a tool used to help design, maintain and manage technological networks. It is also commonly used within organizations and government agencies to oversee local area networks, wide ranged area networks, segments, and other necessary data communication systems as needed.

Leave a Reply

Your email address will not be published. Required fields are marked *