Statement of Purpose All through my undergraduate studies, I have strived to develop a strong understanding of topics across the breadth of computer science as I believe an initial holistic approach can prove a solid foundation for any future pursuits in the field. Now, I would like to delve deeper into those topics that interest me and carve out a niche for myself in them. Over the years, I have been particularly interested in Computer Security. It is required in almost every aspect of systems development and draws heavily on knowledge of the intricate workings of networks, operating systems and mathematics. It was in my 3rd year of undergraduate studies that I was introduced to its fundamentals through the course “Number Theory and Cryptography”. Learning about RSA and zero knowledge protocols introduced me to this whole new way of looking at security. This convinced me to take up “Computer Security” as an elective in order to develop a deeper understanding of the subject. Other courses like networks, operating systems, distributed systems etc. furthered my understanding of the role security plays in all these fields. Later, my experience working in the industry taught me the different ways a product’s security can be compromised and all the measures and methods that should be taken while designing the product architecture and while doing the actual coding. I believe through all this I have acquired an ideal mix of a strong foundation in security as well as practical knowledge, which will help me bring my own unique angle to solving problems. Pursuing a master’s degree in computer science at UTCS will allow me to more fully develop my knowledge in these areas and contribute my own bit to the ongoing research. ... ... middle of paper ... ...ests organized in our college. I believe that all of my theoretical and practical knowledge across the breadth of computer science provides me with the right skill set to pursue graduate studies; as I not only know how different fields relate to each other but I can also effectively bring about the intertwining of different fields with security. This strong foundation and my thirst to learn more is what I bring with me to UTCS. I would like to conclude by saying, that it is not only the reputed name of UTCS, but it is the range of research that has happened and is happening at UTCS, which has attracted me to it. I would love the opportunity to work with the security group and explore the areas together. I thank you for reading my statement of purpose and would like to end by saying that it indeed would be an honor, and a dream come true, to be part of UTCS.
As the future stores in Kinyasi’s plans, he graduates with Bachelor of Science in Computing Security this May recently. He continues his goal to receive the Master of Science and will graduate in the next May. After graduation, he plans to look for a job across the United States as he loves to travel around the new places. He wants to gain more experience through work for next few more years. When he satisfies his goal, he will return to Tanzania, to set up a business and use his skills to improve security. There are not many security companies and he wants to improve the security to prevent hack, threats, and virus risks. If the security plan does not work out, he plans to do entrepreneurship for farming (how to improve crop demands) or build better properties provided for deaf people.
Though I have a number of intellectual interests, three of them are particularly conspicuous: politics, economics, and technology. These interest both excite my curiosity while teaching me lessons that will prove useful for me in life.
Communication – Being able to answer questions regarding all aspect of security. How security is connected to a DHS. Security technology and advancement, what rewards are offered? How security relates to management goals (Youssef-Morgan & Stark. 2014). Safeguards and security personnel, and to prescribe the policies, plus Responsibilities, and authority for training programs.
It fits perfectly with the multidisciplinary degree. I am able to view situations through several different viewpoints. I can apply different ideas and think about which one works best.
U. S. Department of Labor, Bureau of labor Statistics (2011) Computer Security Occupational Outlook Handbook. Retrieved Januray 26, 2011, : http://www.bls.gov/oco/ocos305.htm
Conducting a field analysis of the Physical Security field became arduous and daunting task due to the lack of resources. It was not a foreseeable issue because it seemed that there was a wealth of information post 9/11 for the Security Field. Trying to navigate the Lehman Library for resources with this topic was done with great difficulty. The word security itself is tied to so many topics that unrelated sources flooded my
In this proposal, I will first discuss the current situation in the Computer Science Field based off of my research. Second, I will discuss my qualifications and why my suggestions matter. Third, I will offer a plan to improve the current degree system. Finally, I will discuss some costs and benefits to my proposal.
I want to be a professional programmer. Although my major study was mainly focused on engineering and mathematics, I had developed a solid interdisciplinary background in the college. When I was solving a problem, I always tried to come up my solutions from different angles. Through coursework, club activity and research, I began realizing the significance of computer science. My broad interests gradually concentrated on algorithm design and robotics. I believe I can achieve the master degree and acquire professional programming skill by my intelligence and diligence.
In reference to computer science, physical security is one of the most important accomplishments a business can achieve. Due to the advent of the modern technical age, all of a company’s records are held on their data systems. First and foremost, theft or loss of historical records and accounting data would instantly cripple an enterprise and could very well lead to its ultimate demise. The high profile news reports just in the last decade verify that. Hackers stole the financial records of several banks, which included the personal information of thousands of customers. Ditto for the Veterans’ Administration, for an employee’s laptop was stolen off site. Inside the computer’s hard drive were the ever important Social Security Numbers of hundreds of thousands of veterans and their families. For example, a financial institution goes to stark measures to ensure the money and securities stored there are safe. Not only are there outside locks on the doors and an elaborate alarm system, there is a fireproof steel vault with the finest timed locks available. Most usually, the valuables are further stored in locked boxes inside that vault. Just like that bank, an organization must strive to make physical security a priority. However, simply locking the data and equipment is far from sufficient. The information technology also needs an “alarm” of sorts, so that the company’s police, the information security specialists, can identify the threat and diminish or eliminate it.
The mind must never be kept idle because of its tremendous capacity to absorb and learn. After careful consideration of my aptitude, interests and experiences gained while pursuing my under graduation in the field of Computer Science and Engineering, I have decided to pursue my Masters in the field of Computer Science. Being a dynamic and ever evolving field, many new developments are expected and there is immense scope for research on new products and applications. To progress and make a mark in this field, I realize that it is important for me to pursue my Masters from a reputable university. I have always dreamt of taking up research.
My ultimate goal in my career is to make a commendable contribution to the computing world either by starting an innovative venture or doing research which would change the dimensions of future computing and the way we perceive the computers. Now I have determined that a dedicated higher study on Computer Science will enable me to aggregate all my previous knowledge & experience on the field and encourage in achieving my career goal. I am looking at Graduate studies to provide me with the required expertise to carry out higher studies.
...ows me to practice all the skills I have learned in college and hone them to perfection. With a broad spectrum of studies that one can look at in information technology management, the sky is the limit for gaining a better understanding of how technology works in our society and how to manage it.
After my twelfth grade, the inherent ardor I held for Computer Sciencemotivated me to do a bachelors degree in Information Technology. Programming and Math, a paragon of logic and reasoning have always been my favorite subjects since childhood. I still vividly remember the time during my graduation,when I was successful in creating a simple calculator application as a class assignment.The joy I derived from creating something that is used by a lot of people to help them perform complex calculations,made me realize the power of computing in its true sense.It was also in my graduation that I developed an immense interest in programming languages such as Java, C++ an...
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
This perfectly holds true for me in the world of Computer Engineering where novel ideas are not a novelty. It is this novelty that entices me to this field and gives me a deep sense of professional pride. In this context, I would like to pursue my graduation in Computer Engineering, which not only supplements the knowledge that I possess but also provides a strong platform for my future career goals.