StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

My Education in Information Security - Personal Statement Example

Cite this document
Summary
 The writer of this personal statement discusses academic research which took four months in 2012 between February and May. The research involved the realization of image encryption based on Chaos System where I applied C+ programming and the logistics map of Chaos system to realize image encryption. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
My Education in Information Security
Read Text Preview

Extract of sample "My Education in Information Security"

Resume summary Resume summary I am Cheng Qian, born and brought up in China with a great passion in the technology world. My educational background tells it all for I have a bachelor degree of engineering where I majored in the Information Security. That was in Sichuan University at Chengdu, China in July, 2012. Currently, am doing my Masters of Science in Information Systems & Operations Management (ISOM) in the University of Florida (USA), which I will be through in May, 2015. Experience being the best teacher I have had it in an academic research which took four months in 2012 between February and May.

The research involved the realization of image encryption based on Chaos System where I applied C++ programming and the logistics map of Chaos system to realize image encryption. I also made an analysis of chaotic image encryption. The research also opened me up to note the advantages of chaos system in the speed of image encryption. In 2011, between the month of March and May I was an intern in Hwadee IT Corporation. The experience in the Corporation was an eye opener as I learnt the security of basic communication platform.

During the internship, I did various activities such as maintaining the network environment, establishing a secure Network Operating System (NOS), encryption, certification and network defense. In addition, I went for another internship for three months at Anhui Provincial Hospital as from July I the same year. This gave me a chance to correct the system bug and customers’ needs during the commissioning and later communicated with the R&D department and assisted them to upgrade related models.

I also communicated with customers who get to use the system to increase our work efficiency. Finally, I was involved in the testing of the system’s function at each stage, ensuring to meet customers’ needs to their satisfactory. I have obtained various skills from my academics and the interns. One is in the Software Engineering which involves assembling language and Microsoft Visual Studio. The other skills I learnt are in Microsoft Applications and Operating systems. Recommendations: TO WHOM IT MAY CONCERN This is to confirm that Cheng Qian was on internship in Hwadee IT Corporation from March to May of 2011.

For the brief period, we have been with him, he has proven to be hardworking, punctual and reliable individual who is courteous in dealing with colleagues, creative, eager to learn new things and willing to take new challenges. We believe he gained valuable practical experience that will enable him to progress in his career, and therefore we recommend him in your organization. Kind regards The Management of Hwadee IT Corporation. TO WHOM IT MAY CONCERN I am writing to confirm that Cheng Qian was a student in Sichuan University studying a Bachelor of Engineering, Majoring in Information Security which he finished in July, 2012.

During the time he was in the school system, he showed commitment in the school work and proved to be a team player, creative and responsible person in completing his assignments on time. We therefore recommend him in your organization. Kind regards The management of Sichuan University.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(My Education in Information Security Personal Statement, n.d.)
My Education in Information Security Personal Statement. Retrieved from https://studentshare.org/education/1628232-1write-a-summary-in-my-personal-linkedin-page2well-written-personalized-email-invitation-to-connect-3two-recommendations-to-recommend-me
(My Education in Information Security Personal Statement)
My Education in Information Security Personal Statement. https://studentshare.org/education/1628232-1write-a-summary-in-my-personal-linkedin-page2well-written-personalized-email-invitation-to-connect-3two-recommendations-to-recommend-me.
“My Education in Information Security Personal Statement”, n.d. https://studentshare.org/education/1628232-1write-a-summary-in-my-personal-linkedin-page2well-written-personalized-email-invitation-to-connect-3two-recommendations-to-recommend-me.
  • Cited: 0 times

CHECK THESE SAMPLES OF My Education in Information Security

Security Framework in the Modern World

Borders have relevance in tackling information security, and looking at borders, domains of various countries interact because they do not have borders, therefore, the domains of a nation will be related to the nation's willingness to assert sovereignty in the domains.... In China, there is a severe internet information security because there is a leakage of information and this requires protection of privacy and other personal data should be strengthened because internet abuse has become unscrupulous....
5 Pages (1250 words) Research Paper

Information Security Planning

The essay “information security Planning” focuses on information security, which is about taking care of business continuity which involves media backup operation, monitoring of incidents, classifying information and suitably providing access to this information to members of the company.... hellip; The author states that information security is an ongoing process that would necessarily require planning and execution.... The information security should be compliant to IS 17799 standards....
2 Pages (500 words) Essay

The Necessity of Information Security in Modern Organizations

Moreover he also pointed out that “European companies to splurge on BPO services “Spend on financial services' Back office,… The above information point towards the huge dimensions of the information security related problems we are facing now.... The term information security refers to the protection of information and Based on the nature of the information, we can classify information into two board categories; private and public.... So, most of the organizations are currently spend enormous amount of money for information security....
4 Pages (1000 words) Term Paper

Securing the Border in Texas

It is the inadequate security that has resulted to this problem, which will then have an effect on the economic development, trade and education.... According to the annual report given by the Homeland security 2 years ago, there are enforcement actions taken every year by the government takes when it comes to securing the U.... The advantage with the federal government showing that the issue of security is under control is that potential immigrants might be discouraged from making more attempts to cross the border....
5 Pages (1250 words) Assignment

To What Extent Can There Be a Coordinated International Effort to Promote Development

Since the dawn of any sort of human civilization, one of the key factors in enhancing any sort of development is security.... Liberalism, founded by Immanuel Kant and Adam Smith, argues that human nature is based on needs but can further be improved through education.... For this reason efforts need to be made to ensure that these nations experience my aim in this paper is to discuss some of the main factors affect development and how they can be tuned to optimize the outcome of their impact geared towards development....
5 Pages (1250 words) Essay

Contemporary Private Security

Document "Modern Private security" describes according to security InfoWatch, one of the biggest problems facing modern private security services is standardization.... However, the problem of high demand is insufficient for supply, which has led to problems on the part of security companies.... hellip; Training practices differ greatly depending on the security company or the state.... Standardization is paramount since it gives the officers a chance to look at security services, not just as a job but also as a career or a profession....
4 Pages (1000 words) Research Paper

Security Options

nbsp;Yet another significant reason to establish policies is to organize the multifaceted tasks of information security.... In the paper “security Options” the author analyzes the Computer security concentration, which focuses on basic security matters that occur in the design, study, and execution of distributed systems.... hellip; The author states that setting up a corporate security policy is one of the vital steps in establishing a strong and secure organizational context....
8 Pages (2000 words) Assignment

Information and Communication Technology Management and Information Security

This paper "Information and Communication Technology Management and information security" examines different categories that can be used for sensitive information answering the question of when designing a system, how does one determine how many categories are necessary.... When designing a system the determination of the number of categories needed for information security depends on the type of information that is in the organization as well as the purpose of the organization or institution....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us