Personal Narrative: My First Year At The Electronics Team

Improved Essays
During my first year in the Electronics Team I had been primarily focused in the career field of medicine; however, after the time spent teaching and helping others with their electronic devices I became curious in computers. When this happened, a copious amount of incidents involving cyber attacks on corporations and the federal government had occurred, and that had intruded upon individuals’ privacy and their well-being. As a result of these events, I had wanted to find a way to assist and to protect the citizens of this nation from possible future incidents such as those that had taken

Related Documents

  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Recently UCLA was involved in a data breech in which hackers gained access to parts of UCLA Health's computer network where 4.5 million patient's sensitive information were accessed. This incident is a huge concern as it questions the ability of hospitals, health insurers and medical providers to safeguard the electronic medical records and other sensitive data that are collected. This network contained names, dates of birth, Social Security numbers, health plan identification numbers and medical information such as patient diagnoses. This access could have begun in September 2014 with some of the information dating back to 1990. Prior to the attack UCLA has been taking steps and spening tens of millions of dollars to strengthen its computer…

    • 154 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    One Sunday afternoon, just this past fall, I had my first IEA show. My trainer and I had been preparing for this for the past few months. My breeches were stiff, and my boots were almost as shiny as the grin on my face. I hoped for the one thing I had yet to acquire: a blue ribbon. The other riders were mounting when I took a deep breath, soaking in the crisp fall breeze.…

    • 690 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Dear, As a person I’m acknowledged to be one of the more athletic people, and might I admit my favorite sport has to be basketball. In comparison to other sports, it emphasizes the use of teamwork in a better fashion, condones more responsibility, and there are constantly nasty wrangles between players. However basketball can be demanding of energy sometimes, and I refer to coding. Coding is a great way for me to explore how far web development has truly gone, and it creates so many possibilities by just changing one variable or one source code. Mathematics plays a large role in my love for coding.…

    • 175 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Everyday technology is improving, which also means that the need for cybersecurity is growing at a rapid rate. Pursuing a career in cyber security requires programming knowledge in multiple languages including python and c++, two languages that I have experience in and enjoy using. During the summer of 2016 I attended a NSF funded cybersecurity camp where I was able to use different softwares to solve hypothetical problems. Cybersecurity is one of my favorite topics to study because of the many sub-fields within cybersecurity providing a vast range of knowledge. Malware is written in different programming languages, such as python and c++.…

    • 247 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    These technologies are also at risk of being attacked by hackers, and using these devices in our professional and personal lives puts our own lives at…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Degrees

    • 767 Words
    • 4 Pages

    As hackers begin to be a threat to companies and governments a new field of work called cyber security emerged. With this new workforce, companies need more than just Information Technology (I.T) professionals because cyber security includes all realms of Information Technology. To make up for the lack of cyber security professionals, academic institutions started implementing cyber security degrees that go by many names such as an Information Security Assurance degree. Although, the relevancy of cyber security degrees are debated, employees with the degree are better prepared for their careers and more valuable to their employers than those without degrees. Through research, professionals proved that employees are better prepared for their…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Nowadays we hear the word “cybersecurity” a lot but do you ever wonder what does it really mean? According to the department of homeland security, “Cybersecurity is general Internet safety, which includes protection of anything connected to or accessible by the Internet- from networks themselves to the information stored in computers.” The University of Maryland University College defines cybersecurity as a measure that protects our computers, networks, programs and data from unintended or unauthorized access, change or destruction.” You can also think of cybersecurity as a fence that keeps others from manipulating the confidentiality, integrity or the availability of your information without your consent. In the past 25 years, technology has…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Subject: Reflection on short report Dear Heidi Smith, Greetings, For this short report, I interviewed my Computer Science 111 instructor Robert Sloan. He is one of most experienced professors of computer science at UIC and is admired by many of the students who take his class. From this interview, I gained insights about his teaching experience and his work in cyber security. Professor Sloan has been working in the field of cyber security and computer science for a long time and has gained a lot of knowledge in this field.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    My First Job When I first began my job, I didn’t care for it at all, but now I can’t wait for my next work day. The day I came home with the news of my first job, my family could not believe it. They were aware that I wanted a job for the reason that all my friends held jobs, but they had no idea I would indeed pursue this idea. I was very proud of myself for achieving this all alone, and I was as surprised as they were that this happened. I remember getting ready for my first day, I was shaking with excitement and a hint of nervousness.…

    • 849 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Have you used a computer today? Well if you have, I bet you thought all the stuff you stored on it was safe. I am going to tell you why it is not. We should not rely on computers so heavily because people store too much personal information on their computers, terrible cyber security, and hackers are too advanced.…

    • 1796 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    When I was first asked to do this interview assignment, I was very concerned as to who I would be interviewing. I did not want to interview any random Engineer because it would not be pertinent to my future career. The few people I would be able to interview that were family friends, were not Electrical Engineers. I knew of a Civil, Chemical, and Mechanical Engineer, none of which I found to fit my assignment. I wanted to specifically interview an Electrical Engineer because they would be able to give me better insight on my desired career.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Why is it important to protect information in the food service industry to maintain competitive advantage? Information security is the process of protecting the availability, privacy, and integrity of data. Information technology and methods of securing it have been around for centuries. Whether it is hiding your diary under your pillow, keeping a secret from others, or encrypting your passwords on a desktop, the need to secure data or information has always been important. In the food service industry it is just as important to secure information from threats that can possibly damage a company’s image and finances.…

    • 2080 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    When I started the process for the Internship at Buffalo Wild Wings, I set up different goals for myself that I wanted to accomplish by the end of the Internship in each department that I worked during the Internship. In the Kitchen Department, I was able to learn the proper procedure for creating each dish by shadowing the cooks and Kitchen Manager. I was able to meet this goal by shadowing Wing Certificate Trainer (WCT) and the Kitchen Manager, not only did I learn the dishes by shadowing WCT and Managers, but also by teaming up with the kitchen staff during high volume and cooking the dishes myself.. Another goal that I was able to accomplish during the Internship was to learn the opening and closing procedure for closing the kitchen by…

    • 943 Words
    • 4 Pages
    Decent Essays