{"id":276,"date":"2021-01-24T19:27:28","date_gmt":"2021-01-24T19:27:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mlock008\/?p=276"},"modified":"2021-01-24T19:27:29","modified_gmt":"2021-01-24T19:27:29","slug":"journal-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mlock008\/2021\/01\/24\/journal-2\/","title":{"rendered":"Journal #2"},"content":{"rendered":"\n<p>Four other majors that old dominion offers are applied mathematics, computer science, computer engineering, and information systems. These are all components when you are working with Cybersecurity.\u00a0Applied mathematics\u00a0is defined as the application of\u00a0mathematics\u00a0to problems that arise in various areas of science, engineering. It is also the development of improved methods to meet the challenges of new problems that might occur in every working day. Applied mathematics relates to Cybersecurity because it allows a specialist to create algorithms and subnets. Subnets allow the creation of protective networks that limit access to resources to only trusted hosts. Algorithms can be used in the development of security protocols.<\/p>\n\n\n\n<p>The second degree is\u00a0computer science, which is defined as\u00a0the study of\u00a0computers\u00a0and computing. This includes their computer foundations, hardware and software, and their uses for processing information. Computer science relates to Cybersecurity by Cybersecurity can be considered a subset of computer science. Cybersecurity specialists must understand the computers and networks in order to monitor and protect against cyber-attacks and vulnerabilities.<\/p>\n\n\n\n<p>Computer engineering\u00a0is the part of\u00a0the engineering\u00a0that combines electronic\u00a0engineering\u00a0with\u00a0computer\u00a0sciences.\u00a0Computer engineers&#8217; purpose is to\u00a0design and develop\u00a0computer\u00a0networks and other devices for different organizations. Computer engineering is\u00a0at\u00a0the\u00a0heart of many\u00a0cybersecurity\u00a0organizations.\u00a0\u00a0Cybersecurity\u00a0can be considered a new subfield of\u00a0computer science, considering in\u00a0cybersecurity\u00a0specialists need to have a deep understanding of\u00a0computers\u00a0and networks in order to analyze attacks that might occur and create solutions. It differs from computer science because, in engineering, this is the building of knowledge. <\/p>\n\n\n\n<p>Information Systems\u00a0is the study of\u00a0systems\u00a0and similar hardware and software networks that people and organizations use to collect and distribute data. Information systems differ from Cybersecurity because they focus entirely on efficiency. They focus on applications such as websites, which are functioning. Cybersecurity supports the information specialist by searching for weaknesses and vulnerabilities.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Four other majors that old dominion offers are applied mathematics, computer science, computer engineering, and information systems. These are all components when you are working with Cybersecurity.\u00a0Applied mathematics\u00a0is defined as the application of\u00a0mathematics\u00a0to problems that arise in various areas of science, engineering. It is also the development of improved methods to meet the challenges of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mlock008\/2021\/01\/24\/journal-2\/\">Read More<\/a><\/div>\n","protected":false},"author":19698,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts\/276"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/users\/19698"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts\/276\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/posts\/276\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/media?parent=276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/categories?post=276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mlock008\/wp-json\/wp\/v2\/tags?post=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}