Preview

Sop for Informationsecurity

Good Essays
Open Document
Open Document
583 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sop for Informationsecurity
STATEMENT OF PURPOSE

Name:
Degree sought: Information Security and Computer Forensics (ISCF)

My decision to pursue Post Graduate study in the United Kingdom is underscored by my desire to be a part of the post graduate program at your institution. This university offers the flexibility needed for such a vast rapidly changing field. The facilities and the faculty at the university are par excellent.

Information Technology is an industry that has changed our lives. In a very short period it has changed the way we have looked at the things since centuries. It is one industry that is going to shape our future for centuries to come. So doing a masters degree in Information Security and Computer Forensics (ISCF) is next logical step in my career.

My interest in Information Security blossomed during my Graduation where Computer Science was my major subject. Right since the beginning of my undergraduate study Information Systems and Security is a subject that has fascinated me a lot. The subjects I have studied at my graduation level include Computer Science, Statistics and Mathematics. This laid strong foundation for my course in Computer Science. My undergraduate studies already focus on the Information processing and security and also statistical analysis of data which are extensively used in Information processing. After this I have joined level 1 course of M.I.T (Master of Information Technology) which was a joint program organized by B.M. Birla Science Centre (India) and University of Udine (Italy).

During Level 1 of Masters degree, my interest for Information Security got even more boost with subjects like Advanced Computer Networks, Computer Security and Management Information Systems and I was awestruck by the vastness of Information Security and how far we can use this features to secure our data and also safeguarding our networks. All this gave me a strong desire to do a full fledge masters degree in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cs120 Final Project

    • 636 Words
    • 3 Pages

    Computers have become an important part of our life. We use them in our home, workplace, and at schools. Unfortunately almost every computer user encounters some type of problem. It could be the disaster of your hard drive crashing or even a forgotten password. The increased use of computers has created a high demand for computer technicians to provide help to users, day-to-day administration, maintenance, and maintenance of computer systems and networks. This is why I have chosen Computer Information Science as my major.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    WGU Personal Statement

    • 265 Words
    • 2 Pages

    As a recent graduate of WGU Master of Information Security and Assurance, I know the importance of good Mentoring and communication to the success of students, and I welcome the challenge of being part of the team keeping WGU’s students engaged and successful. In addition to my information security credentials (CISSP, CHFI, CEH, Security +) and personal qualities, I have a solid background in teaching information technology in the classroom face-to-face, hybrid, and online.…

    • 265 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Why I Choose Engineering

    • 513 Words
    • 3 Pages

    An enormous number of challenges, thrown out by rapid development in science and technology, have made me choose engineering profession. My predilection to this field of study is because of its immense diversity in applications and the range of complexities it possesses. I chose to major in Computer Science Engineering with an intense urge to develop deeper into this challenging field. This century can be credited with have given birth to too many ideas, visions, ways of living and working. It can be credited with almost as many revelations of thoughts and practices. One of this faith in technology as the panacea of all the problems of mankind and a means to human progress. Perhaps our age will be known as the Information Revolution or the Computer Revolution, for we are witnessing a remarkable growth and development of computer and information technology and applications. I have learnt various fundamentals of Computer Science and information technology, which together with practical course work reinforced my interest.…

    • 513 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Information Security Policy

    • 2658 Words
    • 11 Pages

    Information Security Policies are a very important part of a company’s protection; these policies are put in place to protect the company and well as the clients. It is important to maintain a constant watch over all security departments daily to ensure that everything is in working order. The policy below is a great way to keep track of the steps needed to protect your company and clients.…

    • 2658 Words
    • 11 Pages
    Powerful Essays