Bachelor Of Science in Business Administration



Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. With the increasing reliance on technology and interconnected systems, has become a critical concern for individuals, organizations, and governments to safeguard sensitive information and maintain the integrity and availability of digital assets.

It involves implementing measures and technologies to ensure the confidentiality, integrity, and availability of digital information.

In an increasingly interconnected world, where organizations and individuals rely heavily on technology and digital systems, cybersecurity has become a critical concern. Cyberattacks, such as hacking, data breaches, ransomware, and other malicious activities, pose significant threats to the security and privacy of sensitive information.

Threats can come from various sources, including hackers,  malicious software (malware), insiders, and even natural disasters. These threats can exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal information, disrupt operations, or cause damage.

Professionals in the field of cybersecurity, often referred to as cybersecurity analysts, specialists, or experts, play a crucial role in safeguarding digital assets. They are responsible for monitoring threats, implementing security controls, conducting risk assessments, investigating incidents, and developing cybersecurity strategies and policies.

Cybersecurity professionals require a combination of technical knowledge, analytical skills, and a deep understanding of current threats and vulnerabilities. They may also pursue certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) to enhance their expertise and credibility in the field.

To protect against threats, various security measures are implemented.Controlling and limiting access to computer systems, networks, and data to authorized individuals or entities through strong passwords, user authentication mechanisms, and access management policies.

Using encryption techniques to convert sensitive information into unreadable formats, ensuring that only authorized parties can access and understand the data.

Deploying firewalls as a barrier between internal networks and external networks (such as the internet) to monitor and filter incoming and outgoing network traffic based on predefined security rules.

Implementing IDPS to detect and respond to unauthorized network activities or potential security breaches in real-time.

Installing and regularly updating antivirus and anti-malware software to detect and remove malicious software from computer systems.

Time Academy Educating users about best practices for maintaining security, such as recognizing phishing emails, using strong passwords, and being cautious while browsing the internet or downloading files.

Conducting risk assessments to identify potential vulnerabilities and threats, and implementing risk management strategies to mitigate and minimize the impact of incidents. This involves regularly evaluating the effectiveness of security measures, performing security audits, and developing incident response plans.

Protecting computer networks from unauthorized access and attacks by implementing network security measures such as secure network architecture, network segmentation, virtual private networks (VPNs), and secure Wi-Fi protocols.

Ensuring the security of software applications by following secure coding practices, conducting vulnerability assessments, and implementing measures such as input validation, user authentication, and secure data transmission.

  • İs an ongoing process that requires continuous monitoring, updating of security measures, and staying informed about emerging threats and vulnerabilities
  • It is a collaborative effort involving individuals, organizations, governments, and cybersecurity professionals to ensure a secure and resilient digital environment.
  • Understanding and complying with relevant laws, regulations, and industry standards related to cybersecurity
  • This includes respecting user privacy, protecting intellectual property, and adhering to ethical guidelines when conducting security testing or vulnerability assessments.
  • Conducting risk assessments to identify potential vulnerabilities and threats, and implementing risk management strategies to mitigate and minimize the impact of cybersecurity incidents.

Course Curriculum

Required Courses

Elective Courses

There're no item that match your search criteria. Please try again with different keywords.

Department Contact Info


1810 Campus Way NE
Bothell, WA 98011-8246


Mon – Fri 9:00A.M. – 5:00P.M.

Social Info

Student Resources

Join Special Event
Engineering Open House
Get real experience in our campus
start in 16 August 2020

Click to see more