Select four other majors offered by ODU and explain how those majors relate to cybersecurity.
Four majors offered by ODU that stand out in ways that relate to cybersecurity are Information systems and technology, psychology, sociology and Systems Engineering.
Information systems and Technology stands out as the first piece in a large puzzle when it comes to cyber security. This degree plan merges the idea for Information systems (IS) and information technology (IT). Information Systems describes the systems, people, and processes designed to create, store, manipulate, and distribute information. Information technology usually involves the study, design and support for computer hardware, software, databases, and networks. Having both of these two functions together, you create a first barrier for the possibility of combatting a cyberthreat. Creating an method of dealing with the known threats by knowing your system and the capabilities that may be damaged by a cyber attack.
Psychology is the understanding and study of the mind and behavior. Knowing the way thing mind works, you can figure out what data would be more valuable in the eyes of a hacker, understand the process of how they think in a way that may benefit the aspect of protection against a cyber attack.
Sociology is the study of the social aspect of a society, social behavior, social relationships, social interaction, and aspects of everyday life. Understanding the method on which a group of people would design a cyber attack or what may lead to a group to attempt to infiltrate a company, government or persons system. For example, if you are looking at Russia and America you can evaluate the social construct of Russia and evaluate what data is at risk, especially due to previous attacks that create a pattern.
Systems Engineering is the focus on designing, integrating, and managing complex systems through out the whole life cycle. When creating a method for designing a complex system through a life cycle you would have to evaluate the possibility of a cyber threat and how it would effect the system and possible ways to provide assurance and protection against an attack.