Free

Cybersecurity - Personal Statement Example

Comments (1) Cite this document
Summary
I have had experience in various areas involving Information Technology, but I believe that an individual never stops learning and thus I have endeavored to continue this…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Cybersecurity
Read TextPreview

Extract of sample "Cybersecurity"

Personal ment I am a highly motivated individual with an aim to transcend the boundaries of the cybernetics community. I have had experience in various areas involving Information Technology, but I believe that an individual never stops learning and thus I have endeavored to continue this process in a direction that will aid my overall ambitions. Since I was a young child, I have had a vivid interest in the workings of technology, and I found the computer to be a fascinating invention that I could not wait to explore. This fascination I admit played a large role in the path that I took in both my academic and career related journeys, and it remains a high motivation to this day.
My academic objectives can be divided into two sections, long term and short term objectives. My general objective at the moment is the acquirement of additional knowledge that would serve me in my career operations. Taking cyber security classes would increase my basis of knowledge in IT and related subjects thus allowing me to not only expand my area of expertise, but improve on the existing ones as well. The overall objective mentioned above can be seen as the leading long term objective in my academic path. I am aware that this would require my whole concentration on the achievement of these objectives in order to progress in this particular aim. I believe that my previous experiences, however, will serve me in successfully achieving this endeavor. My previous studies in India concerning web programming languages enabled me to develop a steady and applicable approach to new academic challenges in my life. This was because apart from the study of the various languages (which included PHP, MySQL and asp.net), I also enrolled for an online course on DB analyzing on www.coursera.com. This was at the same time as my web language courses that helped develop my personal organization and prioritization skills.
My research interests lie in the world of E-commerce, and my main career plan is growing the business that I established with two other partners after my studies. This company offers web solutions for any company with (or in need of) an online platform. This business will be able to achieve this growth through the additional expertise I will gain from the cyber security classes. About my qualifications, I have a number of past achievements that I believe puts me in the driver’s seat for additional success should I continue to apply myself. As a student, my graduation project was able to win first place in Salman bin Abdulaziz University in the year 2013. The project was done with three other students and was categorized in the scientific and engineering colleges section. I also had the pleasure of being one of the 26 students chosen by the Ministry of Foreign Affairs to take part in a Saudi Indian Youth Forum in 2012. I was also one of the ten students chosen by the UNDP to take part in a Peace boat for its 73rd voyage to talk about peace in Islam.
Some of the main reasons that I want to join this prestigious institution includes the fact that I believe the top notch education facilities available will enable to achieve my academic objectives with the greatest of ease that can possible be afforded. A former alumnus by the name of Dr. Luay Assidmi suggested this particular program for my progression, and I believe the completion of this class will strengthen my abilities in online security. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Personal Statement Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1681709-cybersecurity
(Cybersecurity Personal Statement Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1681709-cybersecurity.
“Cybersecurity Personal Statement Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1681709-cybersecurity.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
ki
kiarra24 added comment 3 months ago
Student rated this paper as
Great work done on the "cybersecurity". I think it is the best document I have seen so far.

CHECK THESE SAMPLES OF Cybersecurity

Cybersecurity

...?CYBER-SECURITY Cyber-Security Affiliation Table of Contents Question No 3 Question No. 3 7 References 12 Question No Choose2 Symmetric Encryption Algorithms to compare and contrast. Discuss what they are, how they work, their advantages/disadvantages, and how/why it was created (did it have a problem or purpose it solved). For comparing two symmetric algorithms I have chosen Stream Ciphers and Block Ciphers Encryption Algorithms. Stream Ciphers is a symmetric encryption algorithm that encrypts the bits of data and information. Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time. In addition, the method of stream cipher is much quicker... Cyber-Security...
5 Pages(1250 words)Essay

Cybersecurity

...?Cybersecurity There are a number of considerations when comparing and contrasting the impact of cybercrime on businesses against traditional crime. The most obvious differentiating factor is the nature of the criminal activity, as in the case of cybercrime the criminals are able to generally evade a physical presence in the environment. Another prominent difference between traditional crime and cybercrime are the business industry’s knowledge and perspective on these issues. Bharra (2012) interviewed four major organizations and discovered that they were not even aware which branch of the Federal Bureau of Investigation (FBI) that should inform in case of a cyber-attack. There is the further consideration that while many...
3 Pages(750 words)Coursework

Cybersecurity

...from the Internet, internal networks, and/or other public systems as well as private systems (Schaeffer, Chan, Chan, & Ogulnick, 2009). Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile based device to any information system by utilizing a particular or a combination of varied data transfer methods. Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n.d.). This paper intends to provide a discussion about mobile computing. The discussion comprises recognizing the significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users. The other...
8 Pages(2000 words)Coursework

Cybersecurity

...? Cyber security Table of Contents Table of Contents 2 Introduction 3 Brief of the Organizations and their Mission 3 Comparison and Contrast of Privacy Policies of Apple Inc., IBM and Microsoft 5 Possible Changes To The Policies For Customer Protection 8 Possible Changes to the Policies to Give More Flexibility to Use Personal Information of Customers 9 References 12 Introduction Privacy policy is fundamentally viewed to be a legal statement or a document that manages and handles precious information of a client or a customer. The privacy policies are often used in various sectors with the intention of safeguarding different valuable information or data of the clients. This particular aspect i.e. privacy policy is much crucial... Cyber...
7 Pages(1750 words)Coursework

Cybersecurity

...? CrypTool Labs 2 (School) This particular report will include the responses to the questions regarding the first two labs that utilize the CrypTool software. Keywords: CrypTool, analysis, software, cryptography, labs Lab Part 1: Introduction to Cryptography Using CrypTool Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The text used for the purpose of this lab is the first few paragraphs of Douglas Adam’s Hitchhiker’s Guide to the Galaxy, along with additional text stating this is where the sample text was pulled from. The N-gram list of Caesar encryption of the document itself would be the most effective... CrypTool Labs 2...
4 Pages(1000 words)Coursework

Cybersecurity

... Question 3 Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information inthe system. Microsoft XP is known to be vulnerable to several threats; some of them include the following: Microsoft windows XP do not allot adequate memory for SMTP control replies hence allowing hackers to be able to read parts of e-mail messages through the use STARTTL commands. This is known as SMTP memory allowance vulnerability. (Vetterling, 2002) Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win an absolute control of computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights. Argument... Question 3...
1 Pages(250 words)Coursework

Cybersecurity

...the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources in controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks. References Aksoy, P. & DeNardis, L. (2008). Information Technology in Theory. Canada, UK: Thomas Learning Inc. Erdbrink, T. (2012, May 29). Iran confirms attack by virus that collects information. The New York Times. Retrieved 2 October 2012 from www.nytimes.com Ivanova, P. (2006). Cybercrime and cybersecurity. International Journal of Information and Security, 18, 5 –...
1 Pages(250 words)Coursework

Cybersecurity

...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework

Cybersecurity

...Cyber Security   Cyber Security Question There are three encryption techniques: asymmetric, symmetric, and hashing techniques. Asymmetric cryptography utilizes two keys, a public key and a private key to achieve encryption and decryption. In a symmetric cryptograph, the key employed to decrypt and encrypt information should be secured as anyone who can access it can interpret the coded message. Hashing produces a rare, fixed-length signature for a data set or message (Sinkov, 1966). Hashing encryption may be the most suitable for securing encrypted session in an online credit card shopping (Kahn, 1996). This is because it is distinctive to a message, small changes to a message causes a different has, therefore, warning... Security   Cyber...
2 Pages(500 words)Coursework

Cybersecurity

... The Principle ity ity’ is one of the principles of Cialdini. The deals with the tendency in human beings of obeying a person who has the authority without questioning (Cialdini). The author also highlights how one can use his or her authority or the authority of someone else in order to influence others and suggests that one should be cautious of using his or her authority. Two examples of the principle 1) The public’s inclination to obey the figure of authority can be seen by the way that young people follow the well-known figures in the film industry i.e. their trends or fashion. Different companies hire famous personalities from the film industry for the commercializing their products to increases sales of their products... The Principle...
1 Pages(250 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Personal Statement on topic Cybersecurity for FREE!

Contact Us