Journal #2

Four other majors that old dominion offers are applied mathematics, computer science, computer engineering, and information systems. These are all components when you are working with Cybersecurity. Applied mathematics is defined as the application of mathematics to problems that arise in various areas of science, engineering. It is also the development of improved methods to meet the challenges of new problems that might occur in every working day. Applied mathematics relates to Cybersecurity because it allows a specialist to create algorithms and subnets. Subnets allow the creation of protective networks that limit access to resources to only trusted hosts. Algorithms can be used in the development of security protocols.

The second degree is computer science, which is defined as the study of computers and computing. This includes their computer foundations, hardware and software, and their uses for processing information. Computer science relates to Cybersecurity by Cybersecurity can be considered a subset of computer science. Cybersecurity specialists must understand the computers and networks in order to monitor and protect against cyber-attacks and vulnerabilities.

Computer engineering is the part of the engineering that combines electronic engineering with computer sciences. Computer engineers’ purpose is to design and develop computer networks and other devices for different organizations. Computer engineering is at the heart of many cybersecurity organizations.  Cybersecurity can be considered a new subfield of computer science, considering in cybersecurity specialists need to have a deep understanding of computers and networks in order to analyze attacks that might occur and create solutions. It differs from computer science because, in engineering, this is the building of knowledge.

Information Systems is the study of systems and similar hardware and software networks that people and organizations use to collect and distribute data. Information systems differ from Cybersecurity because they focus entirely on efficiency. They focus on applications such as websites, which are functioning. Cybersecurity supports the information specialist by searching for weaknesses and vulnerabilities. 

Leave a Reply

Your email address will not be published. Required fields are marked *