{"id":273,"date":"2021-05-21T20:16:06","date_gmt":"2021-05-21T20:16:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nhard010\/?p=273"},"modified":"2021-05-23T23:26:47","modified_gmt":"2021-05-23T23:26:47","slug":"journal-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nhard010\/2021\/05\/21\/journal-1\/","title":{"rendered":"Journal #1"},"content":{"rendered":"\n<p class=\"has-text-align-left has-vivid-green-cyan-color has-white-background-color has-text-color has-background\">       Currently I am a cybersecurity major at Old Dominion University, my major does not just relate to cybersecurity technology, but is the essence of what it is made up of. As a cybersecurity major, I am and will study several different fields throughout my educational career in order to better understand the field of cybersecurity. There is not one word that can describe cybersecurity because it is an interdisciplinary field. To fully grasp all the concepts necessary to succeed with a career in cybersecurity, a person has to be well versed in several areas. As a cybersecurity major, it is a requirement to know and be able to protect these new technologies in today&#8217;s world. Since cybersecurity is interdisciplinary and requires a large range of study, there are many majors that Old Dominion offers that relate to this particular field of study. One major that relates to cybersecurity technologies is criminal justice. With a new age of technology, there is a big overlap between cybersecurity and a criminal justice major. There are constantly new cyber attacks that could threaten not only small organizations but also the United States&#8217; national security. For a criminal justice person to be able to persecute someone for these crimes, they have to know these new technologies and rules\/laws that go alone with it. Another major that relates to cybersecurity is computer science. In order to know how to prevent, stop, and respond to cyber attacks, a person has to know the workings of a computer. Cybersecurity technologies is closely related to computer science because one cannot work without the other. Without cybersecurity technologies a computer scientist would not be able to continuously update and run certain programs, and without computer science there would be nothing for cyber people to protect. Yet another major that relates to cybersecurity technologies is business. This one may seem like a surprise, but actually has a lot more to do with cybersecurity technologies than most people think. Business majors have to know how to protect their small companies they own or large corporations they work for. Without cybersecurity technologies businesses would be vulnerable to cyber attacks that would cost a lot of money to fix and make their customers lose faith in their company, which also costs the company money. Last, but not least, information systems and technology relates to cybersecurity technologies. Cybersecurity teams and information systems &amp; technology (IT) teams have to work together closely to implement plans that protect the organization and its information. A good majority of the time IT people help cyber teams fix any holes in the system and update plans to continue to protect its information. Without IT being involved in keeping data secure, organizations would be more at risk to new cyber attacks. Overall, cybersecurity technologies is in a variety of majors, but each is important to keep the other going and keeping data protected. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Currently I am a cybersecurity major at Old Dominion University, my major does not just relate to cybersecurity technology, but is the essence of what it is made up of. As a cybersecurity major, I am and will study several different fields throughout my educational career in order to better understand the field of cybersecurity&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nhard010\/2021\/05\/21\/journal-1\/\">Read More<\/a><\/div>\n","protected":false},"author":20815,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/posts\/273"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/users\/20815"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/comments?post=273"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/posts\/273\/revisions"}],"predecessor-version":[{"id":276,"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/posts\/273\/revisions\/276"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/media?parent=273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/categories?post=273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nhard010\/wp-json\/wp\/v2\/tags?post=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}