Introduction
With the increase in the number of cyber-attacks reported daily across the globe, I believe it is high time cybersecurity is given a top priority by the government. I think that if the world gets more computer forensic experts to work on curbing cyber insecurity, then the threat of cyber-attacks can be reduced to minimal levels. The growth in internet use in the last decade has increased the number of channels available for cyber attackers to exploit since more people prefer doing their transactions online and waiting for deliveries rather than making physical purchases. The use of the internet also has exposed people's data and information the yet to be fully secured world of the internet. Since the world is undergoing an intensive digital revolution and most of the activities have shifted to online platforms, it is essential that computers, networks, information, and data be appropriately secured.My interest and belief in the need for better cybersecurity systems arose from an unfortunate encounter I had with cyber attackers. I had used a coffee shop WIFI connection to purchase a book I need while still in university. I used my debit card to pay for the book online. Upon trying to make purchases in the supermarket the next day, I got a surprising message that the card had insufficient funds. After complaining to the bank, I was informed that the card had been used to make purchases during the late hours of the night. I then realized that my card had been hacked.
As an individual with interests in counterterrorism and intelligence, I asked myself several questions about the ordeal. What if my card had been used to purchase weapons? What if the hacker had transferred to money into the accounts of syndicates, criminals, or terrorists, how could I justify before the court of law that I am not a member of the illegal group? It then dawned to me that through cyberattacks, people lose a lot of money and are exposed to other legal problems, which may arise from misuse of personal information and data.
As I grew up, the threat of terrorism was becoming a real problem for the global community. The stories and movies themed on counterterrorism were always screened on television and in movie theaters. Watching counterterrorism movies, and reading the stories on terrorism and cyber-crime, led to the development of my interests in counterterrorism and intelligence. Through my Bachelor of Arts in political science, I gained knowledge on the humanities aspect of counterterrorism, and now I believe it is high time I gain insight on the technical issue of intelligence analysis.Conclusion
I believe in having a successful career in computer forensic analysis or cybersecurity; I have to gain immense knowledge in the field of cybersecurity through studying a Master's in Cybersecurity Technology. By combining the expertise in cybersecurity and my interests in counterterrorism and intelligence, I will be able to serve the United States of America and the world at large in curbing the threat of terrorism. I believe by combining my passion in counterterrorism and intelligence with knowledge in cyber security I will be able to help in dealing with cyber-attacks, which serve to some extent as the source of finances for illegal dealings and terrorism. It would be fascinating to be able to track down cybercriminals who tend to believe that they are invisible. I dream of a day when data and personal information of individuals will be secure from the hands of cybercriminals.
Cite this page
Personal Statement and Belief on Cybersecurity. (2022, Mar 03). Retrieved from https://proessays.net/essays/personal-statement-and-belief-on-cybersecurity
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Essay Sample on Cyber Security
- Comparison of Books "Is Google Making Us Stupid and "How Computers Change the Way We Think
- Essay Sample on Connecting to the Internet: A Look at WhatsApp Security
- Essay Sample on Managing Risk in Business: Cybersecurity, Finance & More
- Paper Example on Cyber Intrusion Hits US Office of Personnel Management: 2 Attacks Detected
- Network Security Intrusion: Mitigating Breaches With Holistic Approach - Essay Sample
- Strategic Risk Management for Database Migration: A Comprehensive Approach