Preview

Cybersecurity Research Paper

Good Essays
Open Document
Open Document
824 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybersecurity Research Paper
Cybersecurity
Katelyn Carol Winkler
University of Maryland University College
EDCP 100
October 14, 2012

Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to
…show more content…
Not only awill I be benefiting companies and/or the U.S. government by protecting classified information, but I will be loving my job because it involves all of my key interests and strengths, and does not involve a lot of tasks that I would particularly dislike. Because I am pursuing a Bachelors of Science in Cybersecurity degree from the University of Maryland University College, I will be on the right track to my set goals involving my chosen career in the Cybersecurity field. There are only two steps from here I can take: 1) be on the lookout for Cybersecurity internships I can apply for in order to familiarize myself with the specific working environment that this career involves, and 2) keep on pursuing my degree in Cybersecurity from the University of Maryland University

You May Also Find These Documents Helpful

  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Career Advancement Opportunities for Cybersecurity Professionals. (2013, January 1). Retrieved January 1, 2015, from https://missioncriticalinstitute.org/cybersecurity-professionals/…

    • 1485 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I am writing to express my interest in Indiana University’s Cybersecurity Risk Management Master’s Program. As a former student athlete and graduate of Indiana University from the College of Arts and Sciences with a major in Criminal Justice and a minor in Psychology, I have acquired knowledge spanning a plethora of criminal behavior theories, which I have been able to utilize in my current career as a Police Officer for the Indiana University Police Department. My time as a collegiate student athlete supplied me with invaluable leadership and communication skills as well as an ability to persevere through any challenge. In addition, I advanced my skillset by attending the Indiana Law Enforcement Academy, graduating with honors.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security and Gap Analysis

    • 632 Words
    • 7 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 3 IT Security Policy Framework Gap Analysis © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 632 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Intelligence analysis is an expanding field that encompasses a variety of educational backgrounds and industries. As an intelligence analyst, you piece together information from multiple sources to learn about the activities of organized criminal organizations, serial killers, terrorists, drug lords and other subjects. Intelligence analysts are involved in the acquisition, evaluation, analysis and assessment of secret intelligence. They work primarily for the UK's three intelligence and security agencies and are also employed by the armed forces and police. Earn a Bachelor's Degree. An intelligence analyst is expected to have earned at least a bachelor's degree from an accredited university. Some law enforcement agencies, including the FBI,…

    • 423 Words
    • 2 Pages
    Good Essays
  • Good Essays

    What is vulnerability management? It is the practice of identifying, classifying, remediating, and mitigating vulnerabilities, especially in software and firmware (Wheeler, 2011). Vulnerability management is a continuous information security risk process that requires management oversight. There are four high level processes that encompass vulnerability management. They are Discovery, Reporting, Prioritization and Response. Each process and sub processes within it need to be part of a continuous cycle focused on improving security and reducing the risk profile of network assets. It is an integral to computer security and network security (Gallager, 2010).…

    • 790 Words
    • 4 Pages
    Good Essays
  • Best Essays

    1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    The FBI Career

    • 1756 Words
    • 8 Pages

    The career I want to pursue deals with the prevention of crime. The Federal Bureau of Investigation is an organization that prevents crime all across the Unites states of America. Since I could remember I have always been into shows, books and anything related to the prevention of criminal activity. One organization that caught my attention is the FBI and that is because of the important work they do. The bureau has many careers in its agency which I can pursue. The two careers in the FBI that most interest me is Cybercrime agent and FBI agent. These two careers I find to be the interesting to me because of my abilities, interests, and skills. The FBI is the most sophisticated and well- known agency around the world. They have dealt with one…

    • 1756 Words
    • 8 Pages
    Better Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Crypto Research Paper

    • 882 Words
    • 4 Pages

    Crypto, also referred to as cryptosporidiosis and cryptosporidium, is a waterborne disease. It brings sickness to the host with tiny cryptosporidium parasites. After the parasites enter the body, it continues by penetrating the small intestines. Its symptoms usually begin within a week of infection. These symptoms include fever, dehydration, weight and appetite loss, stomach cramps, vomiting, and watery diarrhea. For people with healthy immune systems, symptoms commonly last around one to two weeks. On rare occasions, it can last up to a month. Furthermore, cryptosporidium can be deadly for people with poor immune systems or if it goes untreated. People with more exposure to other infected people and water, animals, and children have a higher…

    • 882 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to the Time.com article "Anne-Marie Slaughter: The National Security Issues No One is Talking About", Slaughter and Weingarten state that, "Cybersecurity is the intersection of technology and national security, the place where we define the policies, systems and practices that keep us and our information secure both on and offline" (Slaughter and Weingarten). This quote means that cybersecurity makes sure that users stay safe whether they are online or not. The jobs that cybersecurity have are web developer, database administrator, programmer, and many more. The purpose of these jobs is not just creating software, but also helping businesses solve problems.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Research Paper on Ict

    • 2832 Words
    • 12 Pages

    The paper summarizes the main advantages of the use of ICT elements in teaching Business English…

    • 2832 Words
    • 12 Pages
    Better Essays