Cybersecurity: A Glossary Analysis

Decent Essays
Everyday technology is improving, which also means that the need for cybersecurity is growing at a rapid rate. Pursuing a career in cyber security requires programming knowledge in multiple languages including python and c++, two languages that I have experience in and enjoy using. During the summer of 2016 I attended a NSF funded cybersecurity camp where I was able to use different softwares to solve hypothetical problems. Cybersecurity is one of my favorite topics to study because of the many sub-fields within cybersecurity providing a vast range of knowledge.

Malware is written in different programming languages, such as python and c++. Being aware of the concepts which these languages offer is needed to be able to read and destroy malware. I have knowledge in multiple languages which are used for different softwares, including java, c++, c#, and python. Programming is an activity that I have found great interest in and I hope to incorporate what I know into learning more about cybersecurity.
…show more content…
The teachers are hired by the NSA which ensures that the curriculum which is taught is the most efficient that it can be. At the camp we were taught how to use softwares including OpenStego, Wireshark, John The Ripper, and others. This helped improve my knowledge of the terms and uses of cybersecurity by giving me and the other students hands on opportunities with the

Related Documents

  • Decent Essays

    Dual Admission Essay

    • 441 Words
    • 2 Pages

    Ever since I was a little boy, I have had dreams about insane technological advancement that I never thought were possible. However, I’ve seen most of it come true and I am only 17 years old. Now as I progress my life, I would like to be a part of the community that is on the frontline of new cutting edge technology. Whether that be helping to develop it or be the one to keep it protected with the expanding field of cybersecurity. Even though my parents have not totally endorsed my love for technology, which has helped me in other areas of my life, I have always been able to influence them enough so I can learn and teach myself about the new tech that is being developed in the world and how to use it with all its implications.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Obtaining A Career At NSA

    • 346 Words
    • 2 Pages

    Taking a programming class in my third year of highschool and practicing the development of code in Python during my free time, it has furthered my interest in the field. Through the class, I have learned to solve logic puzzles, use expressions to execute specific…

    • 346 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The second concern is the RMF and how protecting the network makes it difficult to introduce a cyber environment simulation. Risk Management Framework is the unified information security framework for the entire federal government with the goal to improve information security and strengthen risk management processes (Department of Defense [DoD], 2014). It protects networks and systems from outside vulnerabilities through implementation and constant assessment of security controls. Through the assessment and authorization process, an authorizing official authorizes each network (DoD, 2014).…

    • 641 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyberterrorism Cons

    • 120 Words
    • 1 Pages

    An enormous threat and instrument for warfare, “cyberterrorism”, with all its iterations, has potential for momentous damage, especially within infrastructures. With the potential for causing civil war, cyber sabotage is very likely to cause state to state interchanges. There is even a larger potential for war between nonstate entities. Just because there is no “ground zero physical crater”, it does not mean the scope of damage is not as significant. A Cyberterrorism preparation fund may be something most major corporations and governments need in this modern internet-technological age.…

    • 120 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Through interviews with professional hackers, this documentary analyzes why hackers are dangerous while scholars study their behaviorism and non-technical skills. Zero Days…

    • 1542 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Ddosing Research Paper

    • 1152 Words
    • 5 Pages

    Being a programmer requires a sense of self indulgence and creativity, for programmers are the deities of their programs and their programs are the product of their ideas. By taking pride in one's code, programmers can create something that others enjoy using, but this can be wiped like a hard drive in a matter of seconds when it comes to malicious users and attackers who seek to only benefit their personal selves. While the activist group, Anonymous, keyed the term “ddosing” by using software such as “Low Orbit Ion Cannon” to ddos certain companies, causing them to lose an average of $700 thousand dollars per year, this type of cyber warfare can be mitigated with the coalition of developers, publishers, and users, with, the use of application…

    • 1152 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Fourth, a cybersecurity industry should also ask their supplier if they are using in-licenses. There are a variety of programs and services that are given built-in licenses that can be abused by their company employees. It is important for cybersecurity industries to make sure that the supplier monitors these licenses that may be abused by their own employees. Fifth, one final question that a cybersecurity industry should ask when they are communicating with their suppliers is what kind of software that is critical to their operations. Many suppliers have a variety of applications that they user to analyze and manage their organizations operations.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    My Future Career The future career that I choose is a Cyber security expert. The interest that I developed in this career was due to a lot of what I’ve saw in the news over the years and from what I’ve personally experienced over the years. A large majority of companies and government agencies hire these experts to help strengthen networks, safeguard information, or prevent cyber-attacks. That’s the part that really interested me.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Served as the Agency’s Chief Information Security Officer (CISO), Senior Technical Advisor for Architecture and Technology, Chief Privacy Official, and Senior COOP planner. Primary functions was the CISO This position was very diverse and encompasses several IT disciplines such as Enterprise Management and operations, application development, information assurance; tactical systems and communication support and COOP. Some accomplishments are: • Developed the agency’s IT risk management plan based on combatant requirements.…

    • 780 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    My chosen major is Computer Science with a business concentration. I have always had an affinity for computers. It seems like on some level they speak to me and I wanted to learn how to speak back in their language. I also am a pretty big gamer and learning how to write and design games is something I have wanted to learn since I was about thirteen years old. Another reason I want to major in computer science is the ongoing proliferation of Internet connected devices and devices with single chip computers in them [1].…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Nowadays, almost every single thing we do daily are related to the cybertechnology, for example, airplane, bank, school, mass transportation, medical, lift, various infrastructures, and so on. All of the systems use by these institution, or the system use to provide such services are unavoidable to be used by the society. If IT professionals misuse their knowledge while develop these system, it might cause serious harm to the people and society, because they are the one who develop various safety-critical software and system for the society that may have life-threatening impact. For such instance, if a radical IT professionals involve in develop the missile systems, and he purposely and secretly leave a bug in the system for him to remotely control the missile systems in the future. One day, he secretly launches the missile to attack a country that cause millions of people dies, it may worse to cause World War III to happen.…

    • 876 Words
    • 4 Pages
    Improved Essays