Preview

SOP for Msc in Computer Security

Satisfactory Essays
Open Document
Open Document
311 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SOP for Msc in Computer Security
In today’s digital world, there is always an ever-increasing emphasis on information security. Cyber Security,one of the biggest challenges the IT industry is facing since its inception drives me to pursue a career in Computer security.

My first practical exposure on security was when I was developing Mobiles based SAP applications in 2011 for one of the top US clients an oilfield services company. The challenges I came across in building secure applications persuaded me to become a security professional. Since then it was no turning back. My hunger to grow and learn in this field landed me an opportunity to work as an IT Manager in one of the largest scheduled banks under the Govt of India.

I started to realize that I needed a strong and a better understanding of fundamentals and underlying principles involved in this field to further my aspiration to be a better security personnel. My families financial woes were always a barrier in me receiving the best education available throughout my learning career. However, my passion for learning was rich enough to sail me through with flying colors.

The very first thing that stuck with me about the university was the Institutional Strategic Plan, 2012-15 and the variety of scholarships available to encourage a student like me. In no time I realized I was looking at the right University.

There are 3 strong reasons for me choosing this course at Kent. Firstly, the course module and structure and the flexibility to choose variety of optional's. Secondly, the option of an Industrial Placement which is a huge plus where I get exposure to real world problems. And lastly, the Kent IT clinic and the career and employability service of the University.

I yearn to pursue my masters in computer security and profusely contribute to make the world a better and a safer place for IT businesses.

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    By obtaining a Master degree I wish to obtain a job in the field. I dream to be part of Intel, IBM, Hewlett Packard in which I can demonstrate my knowledge and skills in application of software and business system analysis. Speaking to Ms. Anna Carlin an alumni from Cal Poly Pomona who graduated in 1984 with a Bachelor of Science in Business Administration, Computer Information’s System and a Master’s of Science in Business Administration, Information Systems Audit in 1992. She currently is a professor at California State Polytechnic University, Pomona previously she was a Consultant at Vanguard Enterprise Security, Business Readiness Manager at Digital Graphics Advantage, Consultant at American Savings Bank (now Washington Mutual), Northern Regional Ad Support Manager at Los Angeles Times, and Western Regional IS Audit Manager at Times Mirror. Ms. Anna Carlin teaches CIS 100 Personal Cyber Wellness, CIS 310 Management Information Systems, CIS 433 Information Systems Auditing, CIS 471 Internet Security, CIS 481 Computer Forensics, GBA577 Advanced IS Audit, GBA578 Security and Privacy of Information Systems. Professor Carlin said she decided to take a career path that would lead her to cyber security and forensics. Professor Carlin has research Interests: IT Audit, Cyber Security, Information Assurance. I look up to Ms. Anna Carlin because she is a perfect role model of…

    • 738 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technical Controls

    • 875 Words
    • 4 Pages

    Posey, Clay. (2010). Strengthening Cybersecurity Series: A Best Practices Guide to Information Security. Retrieved November 14, 2012 from http://www.businessofgovernment.org/sites/default/files/A%20Best%20Practices%20Guide%20to%20Information%20Security.pdf…

    • 875 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    final assignment GS1145

    • 685 Words
    • 2 Pages

    I want to have a Degree not only in Information Technology, but also in Cyber Security. CyberSecurity – is a little more advanced in Information Technology. I can repair computers, but, I also want to know about hacking a little more. I want to be able to sit in a room doing nothing but CyberSecurity. In this field your mind grows each and every day. That’s what I need I need to be in a field where I face a new challenge every day. I have to admit that I get bored just sitting and waiting for the phone to ring and answer the question about a blue screen of death. I want to be able to do a different job each day. I have set in my mind that this is what I want to do, in order to achieve that I need to step up and get started. The main focus will be that I will have my Bachelor’s Degree, when it’s all done. I will feel much better about myself because I know that I am on my way to earning this Bachelor’s Degree. I will be pushing hard to have a job outside the Government. I am now focusing on working at the airport. Southwest Airlines is now my focus, so I will continue on working on my getting an Internship with them. Everything is possible, but, I again love flying and love Southwest Airlines. Information Technology is always needed in every work place.…

    • 685 Words
    • 2 Pages
    Powerful Essays
  • Better Essays

    Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Good Essays

    This report is the result of SDI's extensive market and company research covering the global cyber security industry. It provides detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of the leading companies in the industry, and key news.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    List of Hosts- HTML

    • 24535 Words
    • 99 Pages

    This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel…

    • 24535 Words
    • 99 Pages
    Satisfactory Essays
  • Good Essays

    SOP for MS in CS

    • 722 Words
    • 3 Pages

    Having learnt from the past, I live in the present with an eye on the future. My foremost dream in life is to be acknowledged and congratulated for my academic achievements. This desire is the main motivation in me wanting to pursue my masters at your esteemed university. I want to reach the zenith in Computing and Information Technology space. In this Ever-changing world of Computer Technology, where each new day sees a spate of new concepts and trends emerging, I want to stay on fast track. Masters degree at your university would not only provide me subject matter expertise but also thorough research oriented study would help me lay foundation for fulfilment of my dream.…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    I've always been fascinated by research, especially work that benefits common people or the environment. The idea that my efforts may better someone's life or help create a greener planet motivates me. So after a successful career in IT, I intend to pursue my MS in Computer Science at University of Pennsylvania in order to build my research skills and work towards my interests in Computer Visualization, Data Mining, and Software Engineering.…

    • 1521 Words
    • 5 Pages
    Good Essays

Related Topics