You are on page 1of 2

Surname 1

Student’s Name

Professor

Course

Date

Information Systems Security

Q1

A bachelor in computer and information system security is one of the tech-savvy courses

available in various universities. Within the past two decades, companies, governments,

organizations as well as individuals have become prone to cybercrime threats. Following the

adverse effects that cyber-crimes cause, demand for experts in systems security has risen. With

skills developed when one partake this course, it is possible to design a company’s security

systems protocols and procedures and often ensure that policies, laws, and standards on systems

security are complied to. My passion for studying this course was inspired by the financial pain

my family underwent when my uncle lost millions of money and contracts after his real estate

website was hacked into, and most of the businesses and payments diverted elsewhere. Since

then, I have developed the desire to learn how to counter such cyber-related crimes, where I am

quite sure that taking a bachelor in computer and information system security sets me on the

right path.

Q2

My educational objective is to become an expert in information system security, where I

will have the capacity to deny unauthorized persons access to control people’s websites, steal
Surname 2

credit card information, as well as ensure that the denial of service attacks is reduced.

Apparently, hackers have developed sophisticated tools that are used to advance the vice of

cyber-crimes via viruses and worms, which should be minimized to the lowest rate possible. To

enhance my skills in systems security, I will also ensure that I blend my degree with several

other professional certifications, such as International Association of Computer Investigative

Specialists (IACIS) as well as Certified Information Systems Security Professional (CISSP)

certifications. Ultimately, I look forward to becoming the head Systems Security Administrator

for a National or a Multinational Corporation and still have an operational systems security

consultancy firm.

You might also like