Field Of Interest Research Paper

Improved Essays
My Field of Interest The field of interest I would like to pursue would be in the field of cybersecurity. I find this field important and interesting. In my field, I sometimes have to provide information to individuals who are or suspect they have been a victim of identity theft. It is a devastating and difficult situation to be in. Unfortunately, due to hacking and data breaches happening frequently, identity theft seems to be an ongoing problem. These portable items, laptops, mobile phones and jump drives contain sometimes personal and or proprietary information and if lost or stolen could be detrimental. The loss of these items could be considered a data breach. I would like to be involved in cybersecurity to try to assist with keeping …show more content…
The names, social security numbers and credit card information are examples of what could be stolen with the intent of this information to be misused by the recipients of this information. This information could be sold and would give individuals the necessary information needed to help steal someone’s identity. This could consist of applying for credit or mortgages, working under that person’s identity or committing fraud using the stolen individuals’ …show more content…
Malware could be part of APPS that could be installed on mobile devices or computers. They can perform in virtually any manner the author wants. It can push unwanted images, keep track of personal and financial information or allow your system to be held for ransom. “FruitFly” was the name of a malware program that was used by a local man to illegally collect on unsuspecting individuals. “Phillip Durachinsky, 28, used the malware to steal people's personal information, including usernames, passwords, financial records, medical records, photographs, internet searches and things that might be considered embarrassing, according to the U.S. Attorney's Office in Cleveland. Fruitfly was able to alert Durachinsky if an infected computer's user typed words associated with pornography. It also allowed Durachinsky to turn on an infected computer's microphone and cameras and record people, according to court filings.” (Heisig, 2018). Working in either the private sector trying to prevent hacking or data breaches is needed and I would like to be part of the field to prevent or locate the people who engage in illegal practices to steal personal information of others for the purpose of it being

Related Documents

  • Improved Essays

    In 2014 hosts downloaded malware every 6 minutes In 2014 hosts accessed a malicious site every 24 seconds Corporate Data at Risk When mobile security is weak, it can provide attackers with personal information, passwords, business and personal email, corporate documents, and access to company networks and applications. In the business setting, that concern becomes magnified. In fact, 87 percent of IT professionals say careless employees are a greater threat to security than cybercriminals. And, 92 percent say employee behaviors could have made a difference in preventing high-profile security…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The authorities also have to opportunity to charge Hammad Akabr and other commercial spyware makers alike, with “file conspiracy charges under the Computer Fraud and Abuse Act or use the Stored Communications Act, in situations where stolen data isn’t intercepted in real time. However Zetter also explains how criminal liability and consequences for the sellers of spyware depend on the overall extent and usage of the produced spyware program along with how the program makers market the…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Purpose: The purpose of this policy is to establish guidelines for the initiation and continuation of vehicular pursuits. Policy: The pursuing of fleeing suspects can pose a danger to the public, officers and even the suspects that are fleeing. Police tactics used to stop fleeing suspects may be viewed as a use of force and may also seem unnecessary to the outside public.…

    • 473 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    1965-1970 Research Paper

    • 1679 Words
    • 7 Pages

    2. Using two examples of different female performers, describe how changes in the role of women in American society were reflected in popular music between 1965 and 1970. The 1960’s were a time for people to express themselves and break out of social norms in their everyday life. But this also was a time for women to break norms and change their role in both society and music during 1965-1970. One woman who was breaking many norms in the musical world at the time was Janis Joplin.…

    • 1679 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The FIU Honors College is built upon one core tenet: urging students towards excellence. That tenet is what draws me to the Honors College. I’m a student who is deeply vested in ever pulling myself towards reaching my full potential. Consequently, I align with the Honors College’s mission to ensure that their students are evermore excellent, not just as academics, but as citizens of the world. I seek to seize the opportunities provided to me by the Honors College to secure a life of liberty: the liberty to advance my experience and sate my voracious appetite for knowledge.…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Year 12 Research Paper

    • 534 Words
    • 3 Pages

    1. Find out the numbers that has the greatest value a) 5.3 b) 4.99 c) 5.198 d) 5.04896 Children should have the ability to compare, order ad represent decimals (11, ACMNA105). The correct answer for the above question is 5.3. Some of the misconceptions could be:  some students may choose 4.99, with the misconception that 99 is the highest number, without considering the whole number, in which 4 is less than 5.…

    • 534 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Eng 102 Research Paper

    • 511 Words
    • 3 Pages

    It has come to my knowledge that there is a limited amount of spots in the ENG 102 class for next semester. I am one of the best candidates to continue into ENG 102 and thrive in Ms. Laduca’s learning environment. Although I do not fear that I have not already earned my spot, I will proceed to justify my case. I have been an adroit student of Ms. LaDuca’s for the last year and a half; she knows exactly what kind of student I am. Since seventh grade, I have been an ebullient honors student in the top ten percent of the 2016 cohort and have not received any grades lower than an A. I always exceed expectations, put in 110% of my effort, and achieve and maintain excellent grades at the same time.…

    • 511 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The GCU library is perhaps the most important tool for a student at GCU. The library is open 7 days a week to help students with numerous types of research. Taking the time to familiarize myself with the library has been both enlightening and educational. I have learned that peer related articles are articles written by an expert on a specific topic, and then evaluated by experts in the topics field. Writing is a huge part of online schooloing, and Iam more confident about my success after learning my way around the GCU library.…

    • 94 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    This means that the information is available to anyone who is on the internet and decides to try to connect to the server. Even people who don’t buy items online can get their credit card information stolen. It’s as simple as buying items around town. Credit card receipts can get stolen from anywhere which include, a restaurant, or the trash. A waiter or waitress can also jot down your name and card information to use later.…

    • 1229 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Faure Research Paper

    • 1374 Words
    • 6 Pages

    Romanticism was a literary movement that traveled in every country of Europe, the United States, and Latin America that lasted from approximately 1750 to 1870. The Romantic Era reached France around the 18th century. This movement was born in the setting full of revolution and wars that caused tension and doubt on the security of the age of reason. Pessimism overwhelmed the views of hope and optimism. Romanticism was against total order that characterized the idea of Classicism and 18th century Neoclassicism .…

    • 1374 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Morning Elizabeth,

I hope this email finds you well! Please let me know what advance placement forms I need to complete, that would allow me to remain at my current practicum site of Montevista Hospital for both Spring 2018 & Summer 2018 terms to complete the following classes SWG 645 & SWG 646. Thanks as always! Calvin…

    • 57 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    As the school year quickly approaching an end, I want to make summer count by staying involved in academic enrichment programs. I have always looked forward to the summer break to be out of school with no studying and no homework, but this year, as I enter into high school, I feel there is so much I can learn during my two month break. At the OSU summer academy, I can sharpen my mind, learn new information and prepare for next year classes. This academy is an opportunity for me to boost my knowledge in technology, math, science and most interestingly, I hope sharpen my ability to read and predict human emotion to prepare myself for a debate class that I will take next year. I want to learn and explore logic and gain the ability to reason.…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Field Experience Paper

    • 732 Words
    • 3 Pages

    Field Experience Working as a Para educator in the Mt. Pleasant School District had opened my understanding about how important it is the job of a teacher. As I observed Mrs. Ensminger performed her duties, it has confirmed my conviction that a teacher is a teacher because they do not see their duties as a job it is a calling. Mrs. Ensminger, a level 1 special education teacher, is already at school no later than 7:15 am. Before school even starts she is already coordinated with core class teachers what she need to work on every individual student under her care. First period in her class is Science.…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Everyday activities such as selling an old computer, filling the car up with gas, going out to eat, or simply taking out one’s trash can result in identity theft. For that reason, identity theft is easier to prevent than prosecute. The objectives of a criminal investigation on identity theft are gathering evidence, affecting an arrest of the criminal, collecting and presenting…

    • 765 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The primary criminal use of stealing a victim’s information is credit card fraud. Apart from using the credit card for purchasing stuffs, criminal will change the victim’s address so that they will not be able to receive the bills and see the charges they did not make, this will allow the criminal more time to abuse the victim’s identity and credit. The criminal too could use open new accounts in the victim’s name. This will result in more incurring charge on the victim line of credit. The Identity Theft Resource Centre has predicted that organised crime groups will be more involved in identity theft related crimes and it will not only be restricted in the U.S or American but will go beyond…

    • 1253 Words
    • 6 Pages
    Improved Essays