Career and College Research Paper
What I would like to do when I graduate from college is work in the world of cyber security. Specifically, I would like to be a cyber security specialist. Cyber security specialists are responsible for creating a secure network for a customer or at their current office in a larger company. When they work for a larger company it is the specialist’s responsibility to make sure that the other employees know exactly how to operate safely around equipment and how to use the equipment in a safe manner. I like this career, because I will get to work with people and I also will get to work with technology. I also enjoy being on the defending team in videogames, and monitoring a network while fending off attacks is
…show more content…
The daily routine for a cyber security specialist starts with them getting to work, and then they spend a decent amount of time checking the architecture of their network defense, as well as performing security scans to check for potential problems. If the specialist works at a company, it is their responsibility to make sure the other employees know how to conduct their business without putting themselves at risk. For example if new employees come are coming in for their orientation, part of their training would be conducted by the specialist and he would relay techniques for keeping the network secure, and he would also explain the importance of keeping the network …show more content…
The college I would like to go to is Rose State College. The college is a two year institution in Midwest City in Oklahoma. The tuition and fees for one semester add up to $3,225, and one third of the college population benefit from financial aid.
At Rose my major will be in cyber security, and the classes I will be taking are network security, script programming, and network administration. Network security would basically be about how to protect a network from attacks, script programming is just learning how to write programs, and network administration would teach me how to manage a network in general. It would take me just two years before I could go into my profession or I could get more schooling at a different college. The requirements to get into Rose are not incredibly high only requiring a nineteen or higher on the ACT. Student must also graduate from high school having all of the required credit hours which include four units of English, three units of lab science, three units of math, two units of history, and one unit of citizenship
I am interested in going into computer science/cybersecurity as a career path. Protecting data, which has become such an important issue in this day and age (such as the Gmail phishing attack, the yahoo account breach), has been something I’ve always been very interested in. I can’t stand it when things are not fair, and black-hat hacking into
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
Cyber security is the designing, creating, using, and repairing most technological and mechanical equipment. This includes programing and creating new technology before it is mass produced in order to insure safety and quality. It also cover the use of programs to protect and fix technological and mechanical equipment from malfunctions, viruses, and hackers. Lastly, cyber security includes the repairing and upkeep of most electronically designed systems. This job is important because most of today’s world is entirely made up of system that need to be protected, maintained, and constantly improved. This jobs needed in order to keep developed countries stable and able to keep developing,
Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security.
The ACT requirement is 19. The SAT requirement is 980. The GPA is 3.0. It takes 15 total hours of specific high school classes, this includes Math, English, History, Science, Art, or a Foreign Language.
Florida State University doesn't come free though. Residents get off with a tuition cost of $2,196, but out of state gets stuck with a hefty tuition of $9,184(Choices, 3). On top of that both instate and out of state students have to pay $4,952 for room and board (Choices, 3). College isn't cheap, and then factor in books and any other fees such as Fraternities or Sororities and then it can get to be a lot of money.
A computer support specialist has many responsibilities. A daily responsibility that is done every day is that they watch computer systems to monitors its performance. Computer support specialist help people set up their computers and show them how to work them. On a daily basis they are always answering questions to resolve problems such as issues relate to hardware and software. Also they must be able to test network systems and check for issues with local area networks. They maintain daily records of their communications. Also they train users on how to use their hardware and software. Computer support specialists stay busy with all their tasks. Also it is important to back up data in case the computer crashes or something happens.
For a career, I would like to be involved in the fast developing computer industry and more particularly with the Internet. I think it has immense potential and I would like to be able to develop the Internet to make it help the lives of day to day people. In this way I would also like to help make computers more like humans with for example voice operated user interfaces.
My ambitiousness and networking opened the doors for me to work at Dell computers after graduating from high school. This was a match made in heaven because my love for technology and business would be brought together. I was able to thrive in this environment due to effectiveness communicating and ability to build rapport with customers and co-workers. I quickly exceled into a leadership role and started different incentives with in my organization. Working for a Global end to end IT Solution Company has allowed me the ability to work on different projects and different people all over the world. Because of my problem solving analytics I have overseen multimillion dollar contracts with the Federal Government agencies. Working with several DoD and Civilian agencies has allowed to experience real life business IT issues. It’s amazing that I have a helping hand in protecting our country and helping our country run more effectively. Creating solutions that work effectively takes lots of time and effort also lots of learning. Learning has inspired me to continue my education, it would make me more successful at my current job and show my daughters that education is important. I believe the University Of Texas at Austin is the right path to challenge myself further. Taking real life IT experience into the class room will also enable me to be a better classmate.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Cyber security is the most important computer technology needed in today’s society. Some people think that better computer design will be cost effective and provide protection to our bank accounts, social security numbers and driving records, but recent hacks like Equalfax which have put millions of people in jeopardy is the reason that cyber security is the most important.
Needless to say, advancing technologies have integrated themselves into more and more aspects of our lives over time. These days, there are little services (including many fundamental services) that don't rely on the internet. Whether it be for e-mail, entertainment, education, or banking purposes, amongst many other available services, we rely on the internet on a daily basis. With rapid developments in the social networking phenomenon, people are online more often than ever before; some may even call it an addiction. Paired with rapid developments in technological convergence, such as that seen in smart phones and even flat screen televisions nowadays, we have access to a wide array of internet-based services everywhere we go. It is clear that, with more of our physical activities being replaced with online activities, the fine line between real life and online life will soon be non-existent. Not to mention, the availability and accessibility to such technologies has also greatly expanded in recent times, with a wide variety of demographics entering and staying within the "cyberspace". This movement to the cyberspace has given rise to many cyber- counterpart terms such as cyberbullying and cybersecurity, all under the realm of cyberethics. This website will discuss the many implications of living in the cyberspace. Furthermore, after a brief introduction to the topic of cyberbullying and cybersecurity risks, a deeper analysis will be conducted through the following lenses: (1) history, (2) architecture & geography, (3) governance & placing barriers, (4) freedom of speech, (5) intellectual property, and (6) privacy. Finally, the website will feature a conclusion & fin...
Recently, the Internet has become the most significant technology in all over the world, which is not only used by the people to contact with each other but also utilized by the business organizations to become global (Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Computer and internet enable the business organizations to execute the Electronic commerce business model, which has become very popular. Computers and Internet are a powerful source in the success of globalization and international business. Computers are being used worldwide and due to this, cyber crimes are increasing continuously with a rapid growth (Cheeseman, 2006).
Unlike many students who are unsure of the specialty they wish to pursue when entering college, my goal has always been to become a computer engineer. Becoming a computer engineer is not simply a decision I have taken lightly. I have thought very long and hard before deciding to pursue this career path.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.