StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Wireless Network Security - Cloud Computing Network - Personal Statement Example

Cite this document
Summary
Perhaps the gradual trigger to the interest in wireless networking security can be traced back from the vast time that I dedicated to the study and teaching Information technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Wireless Network Security - Cloud Computing Network
Read Text Preview

Extract of sample "Wireless Network Security - Cloud Computing Network"

Download file to see previous pages

This did not auger well with the ethics of data computing, privacy and security. This gave me the reason to think more on wireless network insecurity as well as the probable way to curb the menace. With thirteen years experience in the computing data; this has given the passion to venture into security measures in the field of computing rather than dwelling on my line of specialization-data structure. Much has been done to improve and enhance data network; but there are those who are out to see the failure of the development.

These are the individuals out to hack others data sources and cause harm or use it for unintended tasks. Any individual within a geographical network range of an open, unencrypted wireless network can snuffle, record or even capture the data traffic and get illegal right of entry to the internal network wherewithal and the internet. (Lou, et al. n.d) This may result into sending of spam or even doing other illegal actions using the wireless network internet provider (IP) address. Attacks by insiders also pose an often neglected threat scenario when devising security mechanisms for emerging wireless technologies.

Therefore, this is a venture that requires someone with a greater passion for sanity on Information Technology. All these may be rare for home routers but highly significant concerning to office networks. Since I have involved myself in the contemporary world of information technology and development, my heart feel disoriented whenever I encounter data insecurity trying to paralyze this marvelous work. With the global growth and embracing of Information Technology by many folks, there is tremendous desire to integrate measures to provide intense security to the data store.

However, lack of knowledge on security issues by many, means anyone nearby might access and use the connection. Therefore as an expert in computer studies and having first hand concept on the actual problem on the ground, I feel profoundly obligated to extend my knowledge on cloud computing security. This will not only help in fulfilling my passion but also help the world in alleviating the menace of data insecurity. For my Masters studies at King Abdulaziz University, Jeddah; I dealt with the topic “The Effect of Visualizing the Roles of Data Structure (RODS) in Student Learning, in a Data Structure Course.

” This expounded more on the structure and utilization of data techniques in analysis. I have also attended various conferences and trainings on IT like “The international Conference on Nanotechnology: Opportunities and challenges, Electronic Exam system, Advanced E-Learning Certificate Program among others.” I have vast working experience in various field of IT like; Head of production and Update of Educational Materials Unit & Lecturer, Instructor in Contact and Support Unit, Technical Specialist in the Admission Unit, and Programmer as well as Instructor; in the student services unit-all in the King Abdulaziz University, Jeddah.

My research experience is also vast on Database-based Workflow Management Systems, Accessing E-mail using Speech Technologies, Microsoft Agent Speech Recognition Engines all of which entail understanding the concept data specialty and security among other researches. The above clearly demonstrate the efforts I have made to equip myself with the necessary knowledge that will enhance research on cloud computing security. My choice of Cloud computing is because it moves databases and application software to the large data centers where

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Network Security - Cloud Computing Network Personal Statement”, n.d.)
Retrieved from https://studentshare.org/information-technology/1435115-wirless-network-security-cloud-computing
(Wireless Network Security - Cloud Computing Network Personal Statement)
https://studentshare.org/information-technology/1435115-wirless-network-security-cloud-computing.
“Wireless Network Security - Cloud Computing Network Personal Statement”, n.d. https://studentshare.org/information-technology/1435115-wirless-network-security-cloud-computing.
  • Cited: 1 times

CHECK THESE SAMPLES OF Wireless Network Security - Cloud Computing Network

Network Design Management

This review ''network Design Management''tells that network management systems is a set of tools comprising if hardware and software components.... Using these components an individual can monitor a complete network and in some cases a number of networks.... hellip; A network management system enables a person to perform a number of tasks these tasks include: 1) Detecting all the devices that are connected to the network....
20 Pages (5000 words) Literature review

Wireless Network Security

The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET.... Moreover, other type of threats that may affect the domestic wireless network operating on an 802.... However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security.... This report talks about Mobile Ad Hoc network which refers to a type of mobile network in which each node has the ability to act as a router”....
7 Pages (1750 words) Essay

Network Security

This essay talks about network security.... hellip; According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information.... As the paper highlights network security guarantees authentication, availability, integrity and confidentiality is important to note that “network security is not absolute”....
10 Pages (2500 words) Research Paper

Integrated system design for cloud enterprise network and a secure BYOD

The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own… Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their BYOD By + Definition of Key Words for BYOD Mobile Technology Consumerization of IT as a trend has improved with the introduction of modern mobile devices....
2 Pages (500 words) Essay

Technology and Foundations into the Wireless Network

The paper 'Technology and Foundations into the wireless network' focuses on many computers that have been connected through the configuration amidst the increased technology in the software and hardware that come with it.... The market is full of wireless management tools whereas the paper narrows down to the analysis of the network problems that arise in wireless network monitoring using the Observer platform.... Their functionalities differ, and one would need all the available in market software to be able to analyze the problems inherent in wireless network architecture....
18 Pages (4500 words) Term Paper

Installing a Networking System at ABA Financials

hellip; The firm has about 130 employees and the computer network system designed is expected to promote the effectiveness of operations and support further growth of the firm.... The report will outline the components of the network including the hardware and software and also show the topology and cabling diagram of the network.... It will finally outline the budget of the network including the installation expenses as well as maintenance costs....
9 Pages (2250 words) Case Study

Cloud Computing

The paper 'cloud computing' presents one of the most essential concepts that will continue to play a dramatic role in the modern century.... cloud computing is undoubtedly a vital component for organizations as it upholds security, embeds flexibility, and allows corporations.... In fact, recent studies have found that organizations achieved on average an 18% reduction in their budget from cloud computing and a 16% reduction in data costs.... cloud computing is a technology that has been around for many years but lately has been the pivotal point for organizations....
5 Pages (1250 words) Case Study

Cloud Computing and Virtualization

… The paper “cloud computing and Virtualization” is a spectacular example of an essay on information technology.... cloud computing is the newest major shift in computing.... The widespread cloud computing is enhanced by the Internet which plays the integral role of being the most appropriate channel for accessing cloud resources.... The paper “cloud computing and Virtualization” is a spectacular example of an essay on information technology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us