Career and College Research Paper
What I would like to do when I graduate from college is work in the world of cyber security. Specifically, I would like to be a cyber security specialist. Cyber security specialists are responsible for creating a secure network for a customer or at their current office in a larger company. When they work for a larger company it is the specialist’s responsibility to make sure that the other employees know exactly how to operate safely around equipment and how to use the equipment in a safe manner. I like this career, because I will get to work with people and I also will get to work with technology. I also enjoy being on the defending team in videogames, and monitoring a network while fending off attacks is
…show more content…
The daily routine for a cyber security specialist starts with them getting to work, and then they spend a decent amount of time checking the architecture of their network defense, as well as performing security scans to check for potential problems. If the specialist works at a company, it is their responsibility to make sure the other employees know how to conduct their business without putting themselves at risk. For example if new employees come are coming in for their orientation, part of their training would be conducted by the specialist and he would relay techniques for keeping the network secure, and he would also explain the importance of keeping the network …show more content…
The college I would like to go to is Rose State College. The college is a two year institution in Midwest City in Oklahoma. The tuition and fees for one semester add up to $3,225, and one third of the college population benefit from financial aid.
At Rose my major will be in cyber security, and the classes I will be taking are network security, script programming, and network administration. Network security would basically be about how to protect a network from attacks, script programming is just learning how to write programs, and network administration would teach me how to manage a network in general. It would take me just two years before I could go into my profession or I could get more schooling at a different college. The requirements to get into Rose are not incredibly high only requiring a nineteen or higher on the ACT. Student must also graduate from high school having all of the required credit hours which include four units of English, three units of lab science, three units of math, two units of history, and one unit of citizenship
I am interested in going into computer science/cybersecurity as a career path. Protecting data, which has become such an important issue in this day and age (such as the Gmail phishing attack, the yahoo account breach), has been something I’ve always been very interested in. I can’t stand it when things are not fair, and black-hat hacking into
The ACT requirement is 19. The SAT requirement is 980. The GPA is 3.0. It takes 15 total hours of specific high school classes, this includes Math, English, History, Science, Art, or a Foreign Language.
After high school I want to further my career at the Cleveland Chiropractic College in Kansas City. There tuition all together will be around $30,213. With the price of college being so high I will need to apply for any scholarships I can. About 75% qualify for financial aid. This college is well known and is very helpful in this career field. I think I will enjoy furthering my career of my dreams there.
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
To begin with, cyber security is described as the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access (Lewis, 2002). In a foreign policy brief, the White House described the importance of combatting cyber security. They said: Cyberspace touches nearly every part of our daily lives. It's the broadband networks beneath us and the wireless signals around us, the local networks in our schools and hospitals and businesses, and the massive grids that power our nation. It's the classified military and intelligence networks that keep us safe, and the World Wide Web that has made us more interconnected than at any time in human history. We must ...
Waterman, Shaun. "Obama Hits Pause on U.S. Action in Face of Crippling Cyber Strikes from Syria, Iran." Washington Times 28 Aug. 2013. Print. (Source B)
For many industries relying solely on NIST framework is not enough. The framework is not meant to replace their existing processes of handling cyber threats, however, by using the framework as a base, they can find the gaps in the most important infrastructure and figure out a way to harden and improve its security. For example, the energy industry is one of the most important industries and it has critical role in keeping the country safe. Therefore, most of the cyber-attacks are targeting it. In order to keep it safe, many agencies are involved in improving the best practices and standards for the industry, and hardening its critical infrastructure.
In today’s day and age there are many ways to commit crimes. A few of the many ways to commit crimes is electronically with Tablets, computers and other such instruments which is called Cyber Crimes. Cyber crimes are very easy to commit with all the technology available to kids and adults alike but with that said there is varying ways to commit them and some are committed by accident or are very miniscule. Cyber crimes are crimes such as stealing or posing as someone by taking their information such as bank security pins, social security numbers, and Id's. By doing this some people open themselves up to being traced back which is what the police use to backtrack and trace the signal to the person who committed the crime. With the people trying to catch the perpetrators it all comes at a price and it’s not cheap.
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
For a career, I would like to be involved in the fast developing computer industry and more particularly with the Internet. I think it has immense potential and I would like to be able to develop the Internet to make it help the lives of day to day people. In this way I would also like to help make computers more like humans with for example voice operated user interfaces.
The out of state tuition is $26,490 dollars. Undergraduate tuition is $873 per unit. The application fee is $50, tuition deposit is $100 per semester, registration $20 per semester, $95 for an enrollment fee, for a first term student. The University also requires you to purchase a student activity pass, which is $30. The estimated under graduate expenses for a full time student is $23,727. The materials and supplies you need, come out to a total of $875 per semester. The housing on campus rangers from $3,973 to 7,921 per semester depending on what dorm you choose (Big Future).
Cyber security is the designing, creating, using, and repairing most technological and mechanical equipment. This includes programing and creating new technology before it is mass produced in order to insure safety and quality. It also cover the use of programs to protect and fix technological and mechanical equipment from malfunctions, viruses, and hackers. Lastly, cyber security includes the repairing and upkeep of most electronically designed systems. This job is important because most of today’s world is entirely made up of system that need to be protected, maintained, and constantly improved. This jobs needed in order to keep developed countries stable and able to keep developing,
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
The campus is located in Oklahoma city, Oklahoma. The cost per credit hour is $101. This is a relatively low cost compared to other colleges and universities in the area.