StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

In the Field of Information Security - Personal Statement Example

Cite this document
Summary
This paper 'Personal Statement in the Field of Information Security' tells us that author would like to be at the top in the field of IS. It has always been his long-term dream to become a renowned Information Security professional. It is his duty to ensure that equipped before entering the field to exercise my competence…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Personal Statement in the Field of Information Security
Read Text Preview

Extract of sample "In the Field of Information Security"

It is evident that apart from the outstanding quality of your institution, which includes a good teacher-student relationship that entices many students; the practical apparatus is among the best in the world.

My enthusiastic venture into the field of Information Security is traceable back during my primary and secondary schools.  Despite being bought up in a third-world country and not able to access computers until my senior year of high school, I performed extremely well in all sciences and mathematics. In this regard, I would like to utilize the increased science and technology to learn and utilize my skills in research work and later work for the U.S government.

            When I enrolled for my undergraduate degree, I was exposed to various Security study programs which underpinned my career interest. My desire to gain a Ph.D. in information security is well backed up by persistence, tenacity, motivation, cogency, and my passion for this program.

             I have prior experience where I managed a database for a family rented association for 5 months. During this period, I gained experience in managing databases. Besides, I interacted with my workmates, and I was exposed to various organizational and leadership traits, which I hold dear up to date. I also student worked at the campus IT center for two years where I often shadowed the network security personnel. This was a great experience.

Conclusion

For any scholar, it is important to have some professional goals and motivation. They are not only good to me as a student/professional but also important in that, they demonstrate one interest in service delivery to society. I believe your program will give me an opportunity towards this effect. The practice will help me put into practice what is covered in the syllabus and use some of the applications in real-life situations.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Address why you are applying for the program, how your degree program Personal Statement”, n.d.)
Address why you are applying for the program, how your degree program Personal Statement. Retrieved from https://studentshare.org/information-technology/1591662-address-why-you-are-applying-for-the-program-how-your-degree-program-will-relate-to-your-long-range-career-objectives-what-personal-or-non-academic-qualities-you-will-contribute-to-the-program-what-prior-experience-why-you-want-to-attend-mit
(Address Why You Are Applying for the Program, How Your Degree Program Personal Statement)
Address Why You Are Applying for the Program, How Your Degree Program Personal Statement. https://studentshare.org/information-technology/1591662-address-why-you-are-applying-for-the-program-how-your-degree-program-will-relate-to-your-long-range-career-objectives-what-personal-or-non-academic-qualities-you-will-contribute-to-the-program-what-prior-experience-why-you-want-to-attend-mit.
“Address Why You Are Applying for the Program, How Your Degree Program Personal Statement”, n.d. https://studentshare.org/information-technology/1591662-address-why-you-are-applying-for-the-program-how-your-degree-program-will-relate-to-your-long-range-career-objectives-what-personal-or-non-academic-qualities-you-will-contribute-to-the-program-what-prior-experience-why-you-want-to-attend-mit.
  • Cited: 0 times

CHECK THESE SAMPLES OF Personal Statement in the Field of Information Security

Security Fraud and Manipulations Using Accounting Policies and Rules

The main aim of the thesis of this paper is to not only evaluate security fraud but also manipulation of accounting policies and rules used in financial reporting with particular allusion to the big corporate affected by auditors manipulations.... With a lot of economic failures cases related to security fraud and manipulation through the use of fraudulent accounting policies and rules in international corporations, it is essential to understand the business practises that have led to loose of shareholders investments....
40 Pages (10000 words) Dissertation

Security and Integrity of Health Care Information Systems

in the field of nursing, informatics has been introduced in order to improve efficiency.... This paper discusses change in the field of nursing, the use, security, and integrity of health information systems, potential threats to the HIS and EPR as identified in various researches, and their effects.... The increasing need for information sharing between the healthcare stakeholders (patients, providers, and payers) and the modern digital trend in record keeping create a need for better security of information....
17 Pages (4250 words) Term Paper

Information Security Policy

The purpose of the information security Policy is to safeguard the Information Technology based assets of Strega Oil and Gas Company from all threats whether internal, external, deliberate or accidental. ... his information security policy of Strega Oil and Gas aims at protecting all the systems of the company belonging to the Information Technology infrastructure.... igned: ______________________Title: ______________________ Date: ___________________IntroductionThis information security policy of Strega Oil and Gas aims at protecting all the systems of the company belonging to the Information Technology infrastructure....
39 Pages (9750 words) Essay

Information security legislation

This realization is increasing in the wake of increasing theft occurrences and other information security.... Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security.... With increasing spotlight on information security in legislation and the media all over the world, companies are being faced with a complex need to conform to privacy and security regulations and standards....
19 Pages (4750 words) Essay

Enron Fraud: Effects of the Scam on the Stakeholder

In this paper 'Enron Fraud: Effects of the Scam on the Stakeholder', the researcher presents comparative data of four years for better understanding the misrepresentation of the data.... All this data had been followed by the various issues which plays significant roles while evaluating the statements....
20 Pages (5000 words) Case Study

Promoting Information Security in Banking Solutions Inc

This case study "Promoting information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... ther failures contributing to information security issues include problems regarding critical systems, business processes, alternative processing facility address as well as directions, notification listing, and procedures for public relations management....
5 Pages (1250 words) Case Study

Database Security Controls

However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause.... he aim of this research is to analyze the current attacks and to assess the security of corporate databases and the related issues which are increasingly becoming significant as enterprises are growing and considering the data they have stored in them....
12 Pages (3000 words) Literature review

E-Crime and SMEs: Lush Cosmetics

Such attacks on the Internet are commonplace, and there are a large number of websites, which suffer from serious security flaws.... lthough the data protection laws do not require a company to employ all its funds towards ensuring the security of its data, these laws do require businesses to enter into suitable contracts with their IT systems operators and website and to check their data on a regular basis and take prompt action on suspecting a breach (Computer Weekly, 2011)....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us