Preview

Cybersecurity Research Paper

Good Essays
Open Document
Open Document
824 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybersecurity Research Paper
Cybersecurity
Katelyn Carol Winkler
University of Maryland University College
EDCP 100
October 14, 2012

Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to
…show more content…

Not only awill I be benefiting companies and/or the U.S. government by protecting classified information, but I will be loving my job because it involves all of my key interests and strengths, and does not involve a lot of tasks that I would particularly dislike. Because I am pursuing a Bachelors of Science in Cybersecurity degree from the University of Maryland University College, I will be on the right track to my set goals involving my chosen career in the Cybersecurity field. There are only two steps from here I can take: 1) be on the lookout for Cybersecurity internships I can apply for in order to familiarize myself with the specific working environment that this career involves, and 2) keep on pursuing my degree in Cybersecurity from the University of Maryland University

You May Also Find These Documents Helpful

  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Asda Ownership Analysis

    • 587 Words
    • 3 Pages

    In this assignment I am going to be describing the type of business, purpose and ownership of two contrasting organisations, in this instance the organisations are Asda and Help for Heroes.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Mtc Paper

    • 1528 Words
    • 7 Pages

    The character I choose is Cuba Gooding Jr. role as “Tre” off of “Boyz in the Hood”. Tre lives with his mother having trouble in school. He lacks respect, maturity with his classmates and adults his teacher say, therefore his mother, frightened of her son future, sends him off to live with his father in Crenshaw neighborhood of South Central Los Angeles. The story about three friends growing up in the hood tragically. They’re trying to figure out how to survive in the violent, crime filled Crenshaw neighborhood. Each one has their own individual struggle and goals in life. Doughboy (Ice Cube), who is a drug dealer, has been in and out of trouble throughout his young life and seems to be happy with his surroundings. Doughboy’s brother Ricky (Morris Chestnut), a teenage father with bright hopes and aspirations of becoming an NFL football player. Ricky’s best friend Tre (Cuba Gooding Jr.) who hopes and dreams of higher education and an escape from the dwelling of the hood. “The hood” where saying the wrong thing or looking at someone the wrong way can end in death. Unlike Tre friends, he has the benefit of a strong father played by Larry Fishburne. He is a responsible, educated and strict father who makes sure his son stays on the right track in achieving his goals in life. Teaching him about responsibility and keeping your cool in adverse situations in order to make a thoughtful decision. Tre’s resolve will be tested when tragedy strikes close to home and revenge and murder seem like the only solution.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Career Advancement Opportunities for Cybersecurity Professionals. (2013, January 1). Retrieved January 1, 2015, from https://missioncriticalinstitute.org/cybersecurity-professionals/…

    • 1485 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security and Gap Analysis

    • 632 Words
    • 7 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 3 IT Security Policy Framework Gap Analysis © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 632 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I am writing to express my interest in Indiana University’s Cybersecurity Risk Management Master’s Program. As a former student athlete and graduate of Indiana University from the College of Arts and Sciences with a major in Criminal Justice and a minor in Psychology, I have acquired knowledge spanning a plethora of criminal behavior theories, which I have been able to utilize in my current career as a Police Officer for the Indiana University Police Department. My time as a collegiate student athlete supplied me with invaluable leadership and communication skills as well as an ability to persevere through any challenge. In addition, I advanced my skillset by attending the Indiana Law Enforcement Academy, graduating with honors.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Intelligence analysis is an expanding field that encompasses a variety of educational backgrounds and industries. As an intelligence analyst, you piece together information from multiple sources to learn about the activities of organized criminal organizations, serial killers, terrorists, drug lords and other subjects. Intelligence analysts are involved in the acquisition, evaluation, analysis and assessment of secret intelligence. They work primarily for the UK's three intelligence and security agencies and are also employed by the armed forces and police. Earn a Bachelor's Degree. An intelligence analyst is expected to have earned at least a bachelor's degree from an accredited university. Some law enforcement agencies, including the FBI,…

    • 423 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Better Essays

    The FBI Career

    • 1756 Words
    • 8 Pages

    The career I want to pursue deals with the prevention of crime. The Federal Bureau of Investigation is an organization that prevents crime all across the Unites states of America. Since I could remember I have always been into shows, books and anything related to the prevention of criminal activity. One organization that caught my attention is the FBI and that is because of the important work they do. The bureau has many careers in its agency which I can pursue. The two careers in the FBI that most interest me is Cybercrime agent and FBI agent. These two careers I find to be the interesting to me because of my abilities, interests, and skills. The FBI is the most sophisticated and well- known agency around the world. They have dealt with one…

    • 1756 Words
    • 8 Pages
    Better Essays
  • Good Essays

    What is vulnerability management? It is the practice of identifying, classifying, remediating, and mitigating vulnerabilities, especially in software and firmware (Wheeler, 2011). Vulnerability management is a continuous information security risk process that requires management oversight. There are four high level processes that encompass vulnerability management. They are Discovery, Reporting, Prioritization and Response. Each process and sub processes within it need to be part of a continuous cycle focused on improving security and reducing the risk profile of network assets. It is an integral to computer security and network security (Gallager, 2010).…

    • 790 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Crypto Research Paper

    • 882 Words
    • 4 Pages

    Crypto, also referred to as cryptosporidiosis and cryptosporidium, is a waterborne disease. It brings sickness to the host with tiny cryptosporidium parasites. After the parasites enter the body, it continues by penetrating the small intestines. Its symptoms usually begin within a week of infection. These symptoms include fever, dehydration, weight and appetite loss, stomach cramps, vomiting, and watery diarrhea. For people with healthy immune systems, symptoms commonly last around one to two weeks. On rare occasions, it can last up to a month. Furthermore, cryptosporidium can be deadly for people with poor immune systems or if it goes untreated. People with more exposure to other infected people and water, animals, and children have a higher…

    • 882 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Research Paper on Ict

    • 2832 Words
    • 12 Pages

    The paper summarizes the main advantages of the use of ICT elements in teaching Business English…

    • 2832 Words
    • 12 Pages
    Better Essays