{"id":276,"date":"2021-09-12T02:46:27","date_gmt":"2021-09-12T02:46:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tmcenery\/?p=276"},"modified":"2021-09-12T02:47:03","modified_gmt":"2021-09-12T02:47:03","slug":"journal-entry-2-a-snapshot-of-majors-at-odu-that-relate-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tmcenery\/2021\/09\/12\/journal-entry-2-a-snapshot-of-majors-at-odu-that-relate-to-cybersecurity\/","title":{"rendered":"Journal Entry #2 &#8211; A Snapshot of majors at ODU that relate to Cybersecurity"},"content":{"rendered":"\n<p>Depending on the company someone works for and their specific responsibilities, there are many careers that can be related back to cybersecurity that one wouldn\u2019t think of; some of which include graphics designer or social media consultant. Others will seem more obvious like a security analyst or ethical hacker. With over 90 bachelor and over 40 master programs, Old Dominion University (ODU) has many major options that can and do relate to cybersecurity. Four of these programs include Computer Science, Cybercrime, E-Business\/E-Commerce, and Network Engineering.<\/p>\n\n\n\n<p><strong>Computer Science<\/strong> is associated with software development. Software developers code data in a variety of platforms and include everything from a low-code\/no-code to traditional development. Either way, these platforms run on business networks and offer potential vulnerabilities to the organization. In today\u2019s world, security must be \u201cbaked-in\u201d during development to help mitigate these potential exploits.<\/p>\n\n\n\n<p><strong>Cybercrime<\/strong> is a field that was grown out of necessity to investigate the growing quantity of malicious activity. Today, \u201chackers\u201d will exploit all types of vulnerabilities for a variety of reasons. Some of the latest ransomware exploits have been newsworthy as they have shut down major pipelines and a large meat supplier to name a couple. A Cybercrime major prepares graduates for many different aspects related to investigating these cybercrimes inclusive of technical and criminology skills.<\/p>\n\n\n\n<p><strong>E-Business\/E-Commerce<\/strong>, also known as Electronic Business\/Electronic Commerce, has been continually growing as increasing people turn to the internet for their shopping needs. With COVID-19 limiting access to regular \u201cbrick and mortar\u201d stores, the demand for E-Business\/E-Commerce grew further. These internet-based businesses collect and hold a significant quantity of customer data, some of which includes personally identifiable information (PII), banking information, and credit card information.<\/p>\n\n\n\n<p><strong>Network Engineering<\/strong> can include the technical tasks of securing data at rest, residing on an organization\u2019s workstations\/servers and data in motion that is transported via the intranet and Internet through various security stacks and boundaries. Network engineers must design and manage these networks and associated devices some of which may include routers, switches, intrusion protection\/detection systems, firewalls, proxies, load-balancers, and servers as well as a variety of other technologies that manage users and control access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depending on the company someone works for and their specific responsibilities, there are many careers that can be related back to cybersecurity that one wouldn\u2019t think of; some of which include graphics designer or social media consultant. Others will seem more obvious like a security analyst or ethical hacker. With over 90 bachelor and over&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tmcenery\/2021\/09\/12\/journal-entry-2-a-snapshot-of-majors-at-odu-that-relate-to-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":21695,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts\/276"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/users\/21695"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts\/276\/revisions"}],"predecessor-version":[{"id":278,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/posts\/276\/revisions\/278"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/media?parent=276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/categories?post=276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmcenery\/wp-json\/wp\/v2\/tags?post=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}