Computer Science Interview Essay

Improved Essays
Subject: Reflection on short report
Dear Heidi Smith,
Greetings,
For this short report, I interviewed my Computer Science 111 instructor Robert Sloan. He is one of most experienced professors of computer science at UIC and is admired by many of the students who take his class. From this interview, I gained insights about his teaching experience and his work in cyber security. Professor Sloan has been working in the field of cyber security and computer science for a long time and has gained a lot of knowledge in this field. Though originally a bachelor in Mathematics from MIT, he admires the relationship between science and mathematics and later realized his leaning is more towards science, specifically computer science. He believes that computer science is a wide-ranging field today and is all about computers, their applications, interactions with humans and its implications. From his rich experience of 30 years of cyber security he believes that, the three big goals of cyber security can be summed up in three words; C.I.A.
- Confidentiality: Information that is supposed to be kept secret is secret.
- Integrity: Information is not changed in unauthorized ways.
- Availability: Access to information on computer systems.

The
…show more content…
One of the parts of his job that he enjoys the most that he gets to travel quite often. The difficult part is that the problems that arise in this particular field are really hard to solve because your opponents are really smart. This requires you to have practical knowledge of cyber security and to not be someone who is a mere rote learner. This very thing excites professor Sloan and motivates him to work better. Another difficulty that the professor faces is that his work is never over, there is always another new problem to deal with. But the flip side is that he is never bored of his work which is the most crucial factor of your work

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    EPCR Detection Paper

    • 1221 Words
    • 5 Pages

    • Data Availability: Data is available round-the-clock to all…

    • 1221 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    he just do the same work every day. this fact let him have the inquisitive to change.…

    • 446 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    ALC Interview Guide. Kylen Blanchette, Rebecca Bubp, Jamie Hilderbran, Emily Mannes, Maggie Sobaszek, and Patrice Somerville Instructors: How long have you been teaching? How long have you been teaching in the Active Learning Classrooms?…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Ap Interview Essay

    • 561 Words
    • 3 Pages

    Good Afternoon Mr. Lanigan, The APS manual states that the AP interview is to begin with an “introduction and statement for the purpose for the interview”. APS policy (1703.50) The policy also states that the APCW is to address the allegations in the report. There is no specific guidance as to when the allegations can be brought up or how you approach the allegations. I am curious to hear your critique of how our staff conducts their interviews of the AP. I am also looking forward to your training that will be much later this year.…

    • 561 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Hacktivism Analysis

    • 1372 Words
    • 6 Pages

    Computer hacking has become more than just tinkering with machine, it has become and idea (Heinzen,Picciano, 2008, p…

    • 1372 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    At 38 degrees latitude north and 92 longitude west, lies the rural farming town of California, Missouri. This town is rich in cornfields, small businesses, and many churches of all denominations. From the quiet fields, to the busy town square this city is home to 4,341 people. What I believe makes California stand out from the other towns is that it has the “oldest continuously operating fair west of the Mississippi” (Kunze). But the thing that impacts me most about this town is the California High School, it’s staff, and the students.…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Tap, tap, tap my computer repeats, resonating softly in concordance with my fingers. I’m using my computer as a way to command my thoughts and translate it into code so that my eyes can visually conceptualize my ideas. I write in a coding language called Python, which is openly available to anyone who can use the hypertext transfer protocol available on all personal computers dating back to the introduction of IBM’s 3270 terminal emulator. Ever since I was ten years of age, I have been writing code to complete various tasks that my mind sees fit.…

    • 1679 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays