On my way to finding my interest in cybersecurity there were many areas of the computer/cyber space that I took an interest in. I originally started with computer science learning how to build PC towers, eventually evolving into me learning how to code and wanting to pursue a career in full stack development. Because of various factors at the time I decided against that career and began favoring cybersecurity. I decided to start by earning a Comptia Security+ certification and I eventually hope to work in cloud DevSecOps.

In our modern century, cybersecurity plays a more important role than some may realize. In terms of college majors, cybersecurity plays an aspect in various topics such as computer science, criminal justice, information systems, and business administration.

In some conversations cybersecurity is considered a subset of computer science. Computer science covers topics from software creation with programming languages to computer hardware doubling in power every 2 years, and throughout all these topics cybersecurity can be mentioned such as TPM’s being built into motherboards for cryptographic functions or hackers exploiting bad code with attacks such as cross site scripting.

In information systems and technology they focus on creating policies and procedures to prevent or minimize the damage that hackers can potentially do. These practices can take the form as runbooks with specific solutions to certain problems or company training to prevent phishing attacks on employees. Business administration would also fit within the same spectrum as IT systems because any business that does business online or stores customer information on a server by law must follow a certain baseline level of security policies in place.

Criminal justice is constantly charging as a result of cyber attacks becoming more frequent. These allow attacks against citizens to be committed from anywhere in the world. Some of the criminals on the FBI most wanted list or wanted strictly for cybercrimes committed in different countries. Because the nature of the attacks being committed have changed, the methods used by law enforcement have changed as well.