Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
As the proliferation of technology and its bourgeoning influence on every facet of the human experience continue to grow, both technical and interdisciplinary approaches are critical to understanding the challenges facing cybersecurity today.
Sociology: As its most unpredictable and dynamic component within the cybersecurity framework, the human element continues to be the weakest link in the system as well as the steadily fastest growing. This human-centered approach would most directly relate to cybersecurity by examining the social constructs and changes in human influences that facilitated online behaviors, both criminal or psychological. Moreover, what socioeconomic factors might normalize cyber group activity? And what technologies exist or were created to impact perpetrators of cybercrime – positively and otherwise?
Psychology: Like Sociology but more behaviorally specific, psychology majors could analyze ways the human mind influences online behavior -social media to business – and brain development within the framework of cybersecurity. This would extend to include creating online identities – real or fake – displaying social norms or lacking remorse and empathy, bullying and catfishing, to committing to ideas or groups online.
Business: As the world evolves more and more into the Internet of Things (IoT), every relevant organization of commerce or trade must keep up an online presence to some degree. The sheer revenue and market value in ecommerce and online marketplaces makes cyber Business a trillion dollar enterprise, and anyone with a cybersecurity focus in Business could go down a range of approaches, from policy to networking to programing to planning and development.
Criminal Justice: With any social construct, a negative reciprocal element exists that will directly oppose the normalized behavior in a criminal context. In cybersecurity, both obvious and unforeseeable aberrant behaviors will arise based on the wide reach of human influence over cyber-systems and related security measures. Also important here is the procedures and protocols put in place to help control cybercriminal activity and reduce risk of information/data breaches.