Statement of Purpose
Why do you want to get a doctoral degree in cyber security The Doctor of Science in Cybersecurity degree is a very unique degree that I do not think is offered in the same capacity at any other school yet. It will allow me to continue learning more about this constantly advancing field; and I believe that this course of study will help prepare me for my future career in the cyber security field.
What are your research interests I have many research interests that are related to the field of Cybersecurity. The first of these is the security surrounding the Internet of Things (IoT). The IoT is one of newest fields in security and brings many new challenges. These challenges are going to continue to multiply with the growth that is predicted in this field. These devices are already making a huge impact on our daily lives and many industries that fuel society today. The second research interest I have revolves around mobile devices. Mobile device
…show more content…
The first of these was the completion of my Bachelor of Science in Cyber Operations. The curriculum in that degree path directly supports the D.Sc. in Cybersecurity program. Following my undergraduate graduation, I continued directly into the Master of Science in Applied Computer Science specializing in Cyber Operations and this degree also directly supported the D.Sc. In Cybersecurity program. Outside of academia I have participated in the Department of Defense Information Assurance Scholarship Program locally known as the Cyber Corps. This program has allowed me to spend time working as an augmentee on a team inside of the Department of the Navy. The teams daily operations focused on clients cybersecurity needs and developing cybersecurity capabilities.
What do you plan to do with your degree once you have
I filtered my search to include colleges located within the United States. Furthermore, I did not look at any colleges that do not provide a cyber security or computer science degree. Following my investigation, the few colleges that did satisfied my prerequisites, were vetted once again. I had to consider which college could provide me the necessary resources to start a career. I found that most of the
This degree will assist me in my future career goals because there are not any other degrees like this one. I am applying to the Homeland Security-Information Security and forensics option because I think this will provide the extra knowledge I will need to go far in the workforce. I want to work to protect this great nation and I want to come in prepared to take on any challenges that arise on a daily bases. I am graduating with a BS in Security risk Analysis-Cyber Security and it has given me a great introduction along with a solid base of what security is and how to establish it. Now, I would like to get a more in depth learning opportunity, focusing on security. I am excited and eager to take this next step in my college career at Pennsylvania
When evaluating what career path to take, I wanted something more than just protecting sensitive data, rather pursuing and investigating cybercrimes. After researching cyber security careers I found that the FBI is the one of the best agencies to combat cyber threats. Furthermore, the FBI is on the front lines of chasing cyber threats around the globe and assisting in cyber intrusions to help protect the United States economy and national security. In turn, this information lead me to their Computer Scientist Program which fits the criteria of employment I am seeking for a number of reasons. First, I want to apply my knowledge to a career were I can help protect my country and fellow citizens from ongoing cyber threats we experience every
The purpose of this study will be to develop adequate security strategies and best practices as a guide to add to the knowledge base of current literature on IoT devices. The current research literature on the internet of things indicates that the number of attacks against IoT devices are on the rise. The number of potential attackers is growing at an alarming rate because of the number of IoT devices that are joined to network every day (Abomhara and Kien, 2015). Tools are available to those same potential attackers are much more sophisticated that they have ever been. (p. 66). This study will provide valuable information to IT leaders, service providers, vendors and IoT manufactures.
Naiyel states that he became interested Cybersecurity and protecting people’s personal information after he learned about job growth opportunities in the field. He attends Montgomery College at the suggestion of his mother. Mr. McClam notes that his family has been a great influence on his career and schooling and be will work to obtain an associate’s degree in Cybersecurity in 2019.
Embracing change is one thing I am all about. I do not know what I want to end up doing with my life career wise after graduation and that is one statement I will take into account. He mentioned cyber security as a new up and coming field in the job market. With more company hacks going on this sparked my interest because security is something I like and I am in
Career Tech will provide me with an environment of friends that are dedicated to the same level of education I am. Career tech meets my family’s standards. It provides a way for me to get a great academic foundation and continue playing for Wasilla Warriors basketball team. I believe Career Tech will boost me into my future and my road to college.
Throughout the years that I have spent in the workforce and during my myriad attempts to complete a postsecondary degree, I have learned many things about myself and about the direction that I would like my career to take. In my most recent encounter with higher education, I was shown and given many tools to utilize in my journey. The most useful of these is the CSU-Global Career Center, which contains quite a few tools and resources of which students may take advantage. By delving through these resources and materials, I have been able to use self-assessment to reflect on my journey thus far and redirect my efforts to better prepare myself for success in the long run. This self-assessment and redirection has helped me to identify my strengths and weaknesses, and has enabled me to understand how to overcome my weaknesses and how to employ my strengths to continue to grow in my life and career.
Unfilled cybersecurity occupations prompt more current position. As the cybersecurity business keeps on prospering, profession openings are
As a child, I grew up enjoying mathematics and science; this led to my dream of becoming an Information Security Analyst by majoring in Computer Engineering in college. I chose this profession because over the past couple of years, the world has become more dependent on technology, which means that there is more technology that needs to be developed and better network security will need to be implanted to meet the progressing world’s standards. By being in this profession, there will always be job opportunities in small and large companies because networks, computers, cell phones and many other gadgets are prone to being compromised. For example, Boeing is a prestigious, global company that is one of the leading manufacturers of cyber security that offers several internship and job opportunities to undergraduates and graduates. Future graduates will be able to learn reliable information on what they need to become an information security analyst because an intensive amount of time was taken to research and find credible sources.
Technology has grown tremendously over the past few decades. Everyday businesses, governments, and everyday people rely on technology for things from banking to communicating with loved ones and business associates. Disrupting this technology can cause major losses monetarily and in the sense of information. According to Information Security Curriculum Creation: A Case Study, “A survey of undergraduate degree programs in Computer Science, Information Technology, Management Information Science, and others show a lack of emphasis on security issues in their curriculum.” There is a strong need to secure and protect information for many, many reasons and as such it is important that an undergraduate curriculum provides a comprehensive approach to teaching information security concepts to its students.
Cyber Security also called computer security and IT security, is the assurance of data from theft or any harm to the gadget, the product and information stored on hardware. It incorporates controlling physical access to the equipment and additionally ensuring against code or data injection or via network access.
Americans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned events and natural disasters. Cyber security main function is to guard computers, networks, programs and data from unintended or unauthorized access, change or destruction.
The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy
My interest in computer security, specifically the areas of programming languages, security network architectures, the development of new approaches to securing large scale enterprise applications and databases begin in my initial computer science courses. I discovered I have a natural affinity for solving complex computational, programming and system integration problems exceptionally fast. I also learned that I have the ability to define a series of coding requirements and complete them with a specific goal of