Through a partnership with Northrop Grumman, I develop my own projects with mentorship from a team of engineers. During my junior year, I utilized Java Eclipse and Android to develop and copyright a mobile application that digitized my high school’s school map, making navigation much easier for students. Due to my spectacular performance, Northrop Grumman offered me a paid summer internship. In collaboration with a team of my peers and the public works superintendent of the Fairfield Waterworks facility, I built a robot capable of diagnosing cracks and leaks in water main pipes. Over the summer, I also attended an eight-hour workshop about soldering electronics. This project garnered several awards at the Ohio State Technology and Engineering Showcase. Now, I am currently developing a low-cost Arduino-powered smartphone with WiFi capabilities. …show more content…
I have learned skills to diagnose and repair software vulnerabilities within Windows and Linux operating systems through the CyberPatriot program. I also participated in additional studies within the Cisco Networking Academy and received a perfect score on the Cisco Networking Quiz during the CyberPatriot competition. Each summer I have dedicated time to learn a new programming language through online courses. After starting with Beginner's All-purpose Symbolic Instruction Code (BASIC), I have since learned C++, Java, and Python, allowing me to develop interactive activities for leadership conferences as well as my award-winning Android
Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.
Utilizing two simple command switches, -O and -v, provided a wealth of information about the host system. Most notably, it listed all of the open ports, protocols, and the operating system of the target system. This quick gathering of information enabled the execution of more detailed commands against specific ports to expose specific vulnerabilities. This information can then be used to address any specific vulnerabilities that are
Since the onset of the first packet switching event that many believe to be beginning of the internet, no other technology besides the printing press has ever transformed the ability to deliver information. Although the internet is used by a large percentage of the civilized world, few Americans realize how vital cyberspace is to our national infrastructure. Today, we are faced with even more threats although it has been a recognized problem since 2009, when President Barrack Obama said “The cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country (Obama, 2009).” Every industry that operates in the United States is dependent on the internet for some aspect of their business. Commerce, transportation, financial institutions, military, as well as industrial control systems are all interconnected. This interconnectedness has created vulnerabilities within their infrastructure that have increasingly become targets of terrorists, script kiddies, foreign governments and hackers of all types.
The cybersecurity simulation rounds in UMUC?s Cybersecurity Master 's degree capstone are an integral part of the learning program. The simulation rounds expose students to real world incidents in a cyber representation of the US. In this environment students are provided a chance to gain experience in a setting where mistakes are far less impactful than those made in the real world. The environment includes five critical infrastructure sectors; DTL Power, Federal Government, Hytema Defense, Mistral Bank and Avisitel Telecom. The control decisions made by each have the potential to impact other groups operating within the environment.
During this course there have been a number of key learning points that would help every organization protect itself from a cyber-event. These include password management, patch management, security policies, encryption, and user training. In each of the cyber security breaches one or more of these standard security protocols were not used.
Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I
Hi everyone my name is Kyle and it is nice to see all the people interested in this course. I have been interested in coding for quite some time now but I have never gotten around to attempt to learn it. So to sum it up I have practically no coding experience but now that I am in a course such as this I can begin to learn the basics of one of the languages and boy am I eager to learn.
“Don’t just play on your phone, program it.” This quote by President Obama, which hung in my AP Computer Science classroom, embodies what it means to be an engineer and
Entering community college with little programming experience, I was eager to learn. I registered for my first programming class excited, with a fresh mind. My professor introduced the class to our first program, "Hello World." Instantly, I was hooked. As I uncovered the complexities of problem-solving and the importance of proper syntax, my love grew stronger. Eventually, with experience in C++ and JAVA, another professor presented a life changing opportunity to me.
I also perform penetration testing and ethical hacking exercises on the systems network, checking for vulnerabilities and document my findings.
When I go to the University of North Carolina Asheville, I will bring with me a curiosity that only those who make the biggest technological breakthroughs in the world possess. Throughout my life I have had the opportunity to grow and adapt with technology as it becomes one of the biggest markets in the world. At the young age of ten, I was introduced to the computer world. I was immediately intrigued and found one of the many passions I would come to find. This is just the beginning of my future.
Northrop Grumman’s history in the defense industry closely aligns them with the public sector and connects them to an identity of Euro-American male-dominated organizations. Over time, however, they have developed and embraced a diverse and inclusive workplace that has had a significant impact on veterans and the LGBT community. Even though they have established a goal for the past several years to increase women and people of color in their workforce, there is still work to be done. It would serve them well to continue building on the strong leadership development and mentorship programs they have in place, broadening its scope to include all management levels and their Board of Directors. Additionally, they may need to take an objective
In addition to studying at the University of Wollongong, I am a tutor, under the University's Indigenous Tutorial Assistance Scheme, for first year Computer Science students, where I tutor indigenous students in CSCI124 Applied Programming, CSCI110 W3 Technologies and MATH121 Discrete Math, in addition to also running the Hour of Code program at the University of Wollongong's International House.
to start in the month of December of 2015. Currently, the project is mainly concentrating
A recent shift in the market prompted Cisco to restructure its organization. This change introduced new vulnerabilities. Within this report is our recommendation to assist in the transition and a roadmap to ensure its success.