.

Wednesday, May 6, 2020

Security and Forensic Computing for Tsinghua- myassignmenthelp

Question: Discuss about theSecurity and Forensic Computing for Tsinghua Science. Answer: Statement of Purpose Based on the master degree program, I have completed my degree in security and forensic computing from Dublin, Ireland. I am planning to pursue my higher education and I really hoped to get enrolled into PHD in computer science in USA University. At young age, I found the computer exciting as playing and generating of different mathematical series throughout BASIC programming. In my undergraduate study, I was introduced basic programming languages and Java. I can understand the key features of different programming languages. Among different programming languages, Java is most powerful language which fascinated me at highest level. Over my master degree, I have begun to show my interest into computer forensics and skill required in how information is controlled and formed into computer system and devices. I have researched all my modules involved into the course, and I feel that I have expand my knowledge into areas of security and forensics computing including of law enforcement alo ng with legal proceedings following the subject. I am quite interest into areas of ethical hacking as well as security of network as I find all areas of hacking attractive and inspirational. I would privilege to learn on various factors associated with ethical hacking and security of data. I have undertaken the course of security and forensic computing to examine of various tools available on the open market and used of those forensic tools for the purpose to retrieve data from the electronic sources. I am also interested into analyzing the professional as well as ethical issues related to computer security along with forensics. A master into security and forensic computing prepares me for the managerial level positions where I can address cyber threats and ensure about the internet security. In my master studies, I was introduced with subject of the computer networks. I have gain knowledge into the practical computer networking. During the course, I have learnt about the software side of the networking such as to implement and develop of various sessions. Throughout the session into the laboratory, I was devoted to develop of programs such as implementation of connection oriented, concurrent multithread file transfer and chat server. Currently, I am working as a lecturer which expands my abilities into communication, project planning and management skills. I believe that I am quite good at decision making and decide what should require to be done and when should be done. As a lecturer, it enhances my communication skills to interact with people and starting conservations. In order to review, I feel that my encouragement, self-confidence and interest for the forensic computing supported by the course which would agree to me to pursue my future career in computer science. I feel that I can get an opportunity to do PhD in computer science would let me to complete my ambition. I am looking forward into such a career into research where I can use my academic background for achieving my research goals with contributions of my field of interest. I believe that my PhD course will allow me to achieve it. Bibliography Broucek, V., Turner, P. (2013). Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the clouda forensic computing perspective.Journal of Computer Virology and Hacking Techniques,9(1), 27-33. Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system.Tsinghua science and technology,18(1), 40-50. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Wu, H. C., Shen, P. D., Chen, Y. F., Tsai, C. W. (2016). Effects of Web-based Cognitive Apprenticeship and Time Management on the Development of Computing Skills in Cloud Classroom: A Quasi-Experimental Approach.International Journal of Information and Communication Technology Education (IJICTE),12(3), 1-12.

No comments:

Post a Comment