Cyber-Security VS Information Technology VS Computer Science

Traver Yates

March 6, 2023

Southern New Hampshire University- English Composition II- Professor Jessica Cannon

In today’s world, where there are many blurred lines between different fields, one thing is inevitable when it comes to IT: there are so many areas that it is difficult for us, as humans, to keep track of them all. Therefore, as I explore the differences and similarities between cybersecurity, computer science, and information technology, it is essential to define each field.

Merriam-Webster defines cybersecurity as protecting a computer or computer system against unauthorized access or attack (Merriam-Webster, 2017). Information technology, on the other hand, involves the development, maintenance, and use of computer systems, software, and networks for processing and distributing data. (“What is information technology or IT? Definition and examples”) Computer science is a branch of science that deals with the design of computers and software (Merriam-Webster, 2019). Although these definitions can sometimes be interchanged, it is important to recognize their differences. People outside these fields may find it easier to understand that you work in IT rather than explaining that you work in a specific subset of the field, much like saying you are a nurse versus explaining your particular area of expertise within nursing.

Unfortunately, some businesses have mistakenly cut funding to their IT department in favor of creating a separate cybersecurity group or outsourcing cybersecurity. This is often due to the misunderstanding that cybersecurity is independent of IT. However, cybersecurity cannot exist without computers and their systems, a key IT component. Similarly, IT cannot live without computer science, which is responsible for designing the systems and hardware used in IT. Therefore, if you take a closer look, each field is interconnected and relies on each other rather than being separate bodies.

Another common mistake is assuming that cybersecurity issues are similar to IT issues. For example, while IT professionals may have some experience with cybersecurity or security, preventing cyber intrusions, data breaches, or general cyber-attacks requires someone who can monitor the networks 24/7 to detect and respond to threats. Similarly, employees in computer science positions write code and develop software but may not have extensive networking, security, or hardware knowledge.

It is essential to understand that these fields are interconnected, and departments within a company should work together for the benefit of the company. Rather than competing against each other for budgets or status within the company, departments should recognize their dependence on each other and work collaboratively. As the saying goes, “humans are the weakest link,” meaning that many errors and mistakes in these fields are due to human error. Therefore, cybersecurity analysts must also consider human vulnerabilities when examining vulnerabilities in a network or piece of software.

In conclusion, cybersecurity, information technology, and computer science are interconnected, and one cannot exist without the others. Therefore, understanding the distinctions between these fields and their dependence on each other is essential. By recognizing this, businesses can work collaboratively and effectively to protect their systems, data, and networks.



Merriam-Webster. (2017). Definition of INFORMATION TECHNOLOGY.

Merriam-Webster. (2019). Definition of COMPUTER SCIENCE.

Phillips, J. T. (2002). Privacy vs. Cybersecurity. Information Management Journal, 36(3), 46.

Sobota, L. (2018, October 30). Humans aren’t weakest link, says cybersecurity expert. Pantagraph, The (Bloomington, IL).

Taherdoost, H. (2023). Cybersecurity vs. Information Security. Science Direct.

What is information technology or IT? Definition and examples. (n.d.). Market Business News. Retrieved March 6, 2023, from

What is information technology or IT? Definition and examples. (n.d.). Market Business News. Retrieved March 6, 2023, from