Tuesday, May 7, 2019

Wireless Network Security - Cloud Computing Network Personal Statement

Wireless Network Security - besmirch Computing Network - Personal Statement ExampleThis did not auger swell up with the ethics of info cipher, privacy and security system. This gave me the reason to think more on wireless network insecurity as well as the probable way to curb the menace. With thirteen years experience in the computing information this has given the passion to proceed into security measures in the field of computing rather than dwelling on my line of specialization- info twist. Much has been done to improve and enhance data network but there argon those who are out to see the failure of the development. These are the individuals out to hack others data sources and cause misemploy or use it for unintended tasks. Any individual within a geographical network represent of an open, unencrypted wireless network can snuffle, record or even capture the data traffic and worry illegal right of entry to the internal network wherewithal and the internet. (Lou, et al. n .d) This may result into sending of spam or even doing other illegal actions using the wireless network internet provider (IP) address. Attacks by insiders overly pose an often neglected threat scenario when devising security mechanisms for emerging wireless technologies. hence, this is a venture that requires someone with a greater passion for sanity on Information Technology. All these may be rare for home routers but highly significant concerning to office networks. Since I contract involved myself in the contemporary domain of information technology and development, my heart feel disoriented whenever I encounter data insecurity trying to paralyze this marvelous work. With the global growth and embracing of Information Technology by many folks, there is tremendous desire to integrate measures to provide intense security to the data store. However, escape of friendship on security issues by many, means anyone nearby might access and use the connection. Therefore as an expert in computer studies and having first hand concept on the actual enigma on the ground, I feel profoundly obligated to extend my knowledge on cloud computing security. This will not only help in fulfilling my passion but also help the world in alleviating the menace of data insecurity. For my Masters studies at tycoon Abdulaziz University, Jeddah I dealt with the topic The Effect of Visualizing the Roles of information Structure (RODS) in Student Learning, in a Data Structure Course. This expounded more on the structure and utilization of data techniques in analysis. I have also attended various conferences and trainings on IT desire The international Conference on Nanotechnology Opportunities and challenges, Electronic Exam system, Advanced E-Learning Certificate Program among others. I have vast working experience in various field of IT like Head of production and modify of Educational Materials Unit & Lecturer, Instructor in Contact and Support Unit, Technical Specialist in t he inlet Unit, and Programmer as well as Instructor in the student services unit-all in the King Abdulaziz University, Jeddah. My research experience is also vast on Database-based Workflow Management Systems, Accessing E-mail using vocabulary Technologies, Microsoft Agent Speech Recognition Engines all of which entail understanding the concept data specialty and security among other researches. The above clearly demonstrate the efforts I have made to equip myself with the necessary knowledge that will enhance research on cloud computing security. My choice of Cloud computing is because it moves databases and action software to the large data centers where

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.