{"id":189,"date":"2024-01-20T20:22:52","date_gmt":"2024-01-20T20:22:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/?p=189"},"modified":"2024-01-20T20:22:52","modified_gmt":"2024-01-20T20:22:52","slug":"select-four-other-majors-offered-by-odu-and-explain-how-those-majors-relate-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/2024\/01\/20\/select-four-other-majors-offered-by-odu-and-explain-how-those-majors-relate-to-cybersecurity\/","title":{"rendered":"Select four other majors offered by ODU and explain how those majors relate to cybersecurity."},"content":{"rendered":"\n<p>Cybersecurity can be described as the way of protecting information by preventing, detecting, and responding to attacks or unauthorized access of a computer\u2019s infrastructure. Without cybersecurity, companies would be able to fall victim more often to attacks. Cybersecurity is a very unique career path and college major, but there are some that I believe can be compared. These are to include cybercrime, criminal justice, computer programming, and cyber operations. Cybercrime is any criminal activity that involved with a digital device, network, or computer itself. These two are very similar since cybersecurity deals with stopping the criminal attack on a network or device, while cybercrime can be finding out who committed the crime and helping prosecute that person. Now with criminal justice, it also very much relates in the fact that criminal justice is all about gaining knowledge and creating a strong foundation in criminal law, crime prevention, and crime investigation. A big part of cybersecurity is trying to find way to prevent cyber attacks. Another part of it is investigating how a cyber attack may have occurred. A computer programming degree helps set up everything for a cybersecurity professional to help protect. From the computer system, network, and any valuable data that a company may need. Without them, a cybersecurity professional may not have anything to protect. Finally, cyber operations is a complementary discipline to cybersecurity. They actually can do some of the same stuff as a cybersecurity major. One of the biggest in my opinion is penetration testing, which is one future career that I would like to get into. But all in all, there is nothing exactly the same as cyber security. This is what makes this major and career path so special and I can not wait to dive deeper into my time here at Old Dominion University.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity can be described as the way of protecting information by preventing, detecting, and responding to attacks or unauthorized access of a computer\u2019s infrastructure. Without cybersecurity, companies would be able to fall victim more often to attacks. Cybersecurity is a very unique career path and college major, but there are some that I believe can&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/thornecyse200t\/2024\/01\/20\/select-four-other-majors-offered-by-odu-and-explain-how-those-majors-relate-to-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":28261,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/posts\/189"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/users\/28261"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/posts\/189\/revisions\/190"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thornecyse200t\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}