STATEMENT OF PURPOSE
Secure yet Unsecure, is an age that we live in. However, in today’s time of information and digital media, vulnerabilities will happen. Valuable assets cannot be hidden forever, nor can any locks prevent its theft. At some point, because of the vulnerabilities existing in our system, the secrets and our data will be accidentally revealed or actively discovered or unintentionally be given away by someone we trust. My passion to secure the cyber environment drives me intensely to research and delve deeper into the flaws and vulnerabilities and find their infallible remedies.
My interaction with computers dates back to the days when I was very young and my father, a doctor in the army, was suddenly posted overseas in the Middle East, leaving behind his Desktop PC for me. Owning a Desktop in those days was a novelty in India and this independence had allowed me to tinker with the computer in every possible way. Operating systems like MS-DOS 6 and Windows 98 were then in vogue. Initially, I installed and tweaked various applications. Eventually, I moved on to major system changing tweaks like Win98 lite (which stripped out explorer), and alternative shells, such as litestep, aston, emerge and geoshell (and later sharpE). My interest in security intensified when I installed multiple antiviruses and firewalls, and tried to get them to run together. What intrigued me was that some programs like Panda Antivirus, had unencrypted databases, and looked like viruses to other antivirus applications! Thereon I used several other intrusion prevention tools, like Process Guard, RegDefend, and SandboxIE.
Having been interested in computer science, and especially the ‘Spy vs Spy’ game of computer security, I spent most of...
... middle of paper ...
...olved with the projects at ISPIA and the ICOREIS research labs. I would like to learn gainfully from Professor Michael Locasto’s experience as my current undergrad project – Smart Disk Imaging is a natural fit with his approach to study of security in Computer Systems. Good research labs, coupled with an enviable faculty and several academic clubs makes University of Calgary an inevitable choice for me. I am, therefore, applying only to your Master’s program in security and to none other, as I firmly believe that it would propel me into the wonderful world of research and academics.
Coming from a humble background, yet having dreams to excel in computer science academia, I shall endeavor to work very hard, and let my research speak for itself. If my Professors deem fit, may I request to be considered for any form of financial support to materialize my dreams.
Privacy and security issues have become one of the top concerns among computer users in today’s market. It has become a game of survival of the fittest in protection of your security. The only true way to defend yourself is knowledge. You should prepare your self against hackers, spammers and potential system crashing viruses and web bugs. Lets focus on how you can protect yourselves from the would be thieves.
I know that through my hard work and dedication I can make my goals a reality. However, it may not be possible without these Scholarships. While my parents will help me in any way they can, I am hoping that my hard work and dedication to my studies pays off. I am a very self-driven individual who will accomplish any goal I set my mind on achieving. I am also aware of how without scholarships I may face a financial setback. I am hoping that through the help of scholarships I will be able to achieve all my goals in a timely
Whitman, M. E. & Mattord, H. J. (2011) Principles of Information Security. Boston: Course Technology. (Whitman & Mattord, 2011)
Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Boston, Mass: Thomson Course Technology.
Every year, cybercrime costs businesses $400 billion and by 2019, cybercrime will have cost the global economy 2.1 trillion dollars (Morgan 1). But, economic loss isn’t the only problem caused by weak cybersecurity; weak cybersecurity measures could allow hackers to collect data on citizens, cause widespread death, and destroy entire nations. Despite the massive threat the problem poses, no one has yet to institute an effective solution. Although government regulation and website blocking attempt to eliminate cybercrime and cyberwarfare, an ideal solution exists in government guidance and collaboration with the private sector.
With the increase of digital communications and transactions, a stronger level of security is required to protect the user and their data transactions. Systems, servers, personal computers, mobile devices, tokens and smart cards are all being used ubiquitously to view protected communications. With the influx of data management, there is an ever-apparent contest between the two adversaries in the game of Information Security: the developers and the hackers. PKI was designed to leverage the Internet infrastructure for communications (CITE Samuelle 2009). While minimizing hostile exploitation of data, decreasing data theft, and providing an additional layer of trust through keys pairs and digital certificates, PKI is used to verify the identity of the user and the authenticity of the data.
... advanced computing, with specific reference to Computer Programming. I therefore believe that I must return to the academic world for further growth and achieve some more milestones.
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
I'm aware about the potential of beginners are eminent but I feasibly surpass them.The interaction with highbrows in this field from around the globe will broaden my horizons and enhance my adorning traits. I assure to be an forte to ---- and I intend that the Admission Council backpack the same spirit. I look forward to a challenging career in research which may even be arduous and demanding at times but I am confident that with my sincerity and dedication, I will be able to make a meaningful contribution to the on going research developments and live up to the high standards expected off your university.Given an opportunity, I shall strive to channel my unbridled efforts into more productive avenues. I would like to say in conclusion that the essence of University education lies in the synergistic relationship between the department and the students. I think that graduate study at your University would be help me best with my academic pursuits and is a major step towards achieving my objectives. I would be grateful if I am given the opportunity to pursue my graduate study with financial assistance at your world-renowned
...ram.I am aware of the kind of dedication and resilience I will have to show over the years. I feel that I am adequately prepared for that, both in having technical qualifications and the right mind-set. My interest in the field of Computer Science and my eagerness to pursue Masters in the field strengthened when I came across the University of xxxx website for Computer Science. I intend to participate in the ongoing research in the campus. I am sure that the peerless faculty, the excellent facilities and the stimulating academic environment among the students of the University of xxx will prove immensely fruitful and facilitate my development as an individual researcher in my field.
Hacking has become such a problem in today’s computer dependent society that stronger measures must be implemented to stop hackers, and if hackers are still successful, they should be severely punished. Hackers are a problem because with the amount of businesses and corporations we depend on ...
Hackers have existed since the launch of the internet itself. Hackers, who pride themselves on demolishing data and changing a computer’s structure, use digital armaments to take advantage of the naiveté of the internet. Although hackers use a variety of me...
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
Cyber Security protection must start changing for the better in today’s evolving world. Everyday there are new cyber threats and traditional approaches will no longer suffice to secure important data and information (“Cyber Attack,” 2016). Because
Have you ever been a victim of Cybercrime? In today’s society, you can be a victim of cyber crime at any time of day because everything is based off of technology. Our society is all about fast pace and advancement of technology. People entire lives revolve around technology, which we use every day to get things done. Computer systems practically run much of the world today from security systems to the computer systems that run most businesses technology is taking control of the world. In this age of technology cybercrime becomes an increasingly more concerning issue. The world’s growing dependency on technology also leads to the world’s vulnerability. Steps are in place to protect against and prevent