Saturday, July 27, 2019

Wireless Network Security - Cloud Computing Network Personal Statement

Wireless Network Security - Cloud Computing Network - Personal Statement Example This did not auger well with the ethics of data computing, privacy and security. This gave me the reason to think more on wireless network insecurity as well as the probable way to curb the menace. With thirteen years experience in the computing data; this has given the passion to venture into security measures in the field of computing rather than dwelling on my line of specialization-data structure. Much has been done to improve and enhance data network; but there are those who are out to see the failure of the development. These are the individuals out to hack others data sources and cause harm or use it for unintended tasks. Any individual within a geographical network range of an open, unencrypted wireless network can snuffle, record or even capture the data traffic and get illegal right of entry to the internal network wherewithal and the internet. (Lou, et al. n.d) This may result into sending of spam or even doing other illegal actions using the wireless network internet prov ider (IP) address. Attacks by insiders also pose an often neglected threat scenario when devising security mechanisms for emerging wireless technologies. Therefore, this is a venture that requires someone with a greater passion for sanity on Information Technology. All these may be rare for home routers but highly significant concerning to office networks. Since I have involved myself in the contemporary world of information technology and development, my heart feel disoriented whenever I encounter data insecurity trying to paralyze this marvelous work. With the global growth and embracing of Information Technology by many folks, there is tremendous desire to integrate measures to provide intense security to the data store. However, lack of knowledge on security issues by many, means anyone nearby might access and use the connection. Therefore as an expert in computer studies and having first hand concept on the actual problem on the ground, I feel profoundly obligated to extend my knowledge on cloud computing security. This will not only help in fulfilling my passion but also help the world in alleviating the menace of data insecurity. For my Masters studies at King Abdulaziz University, Jeddah; I dealt with the topic â€Å"The Effect of Visualizing the Roles of Data Structure (RODS) in Student Learning, in a Data Structure Course.† This expounded more on the structure and utilization of data techniques in analysis. I have also attended various conferences and trainings on IT like â€Å"The international Conference on Nanotechnology: Opportunities and challenges, Electronic Exam system, Advanced E-Learning Certificate Program among others.† I have vast working experience in various field of IT like; Head of production and Update of Educational Materials Unit & Lecturer, Instructor in Contact and Support Unit, Technical Specialist in the Admission Unit, and Programmer as well as Instructor; in the student services unit-all in the King Abdulaziz U niversity, Jeddah. My research experience is also vast on Database-based Workflow Management Systems, Accessing E-mail using Speech Technologies, Microsoft Agent Speech Recognition Engines all of which entail understanding the concept data specialty and security among other researches. The above clearly demonstrate the efforts I have made to equip myself with the necessary knowledge that will enhance research on cloud computing security. My choice of Cloud computing is because it moves databases and application software to the large data centers where

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.