Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Page 1

PLAGIARISM SCAN REPORT


Date 2021‐12‐07

6% 94% Words 816


Plagiarised Unique

Characters 5142

Content Checked For Plagiarism

In today's time, Internet has become omnipresent. We live in an age of the internet where data has become a new
currency. As a result, a person cannot imagine a day without internet whether it is for ordering food or watching his
favorite movie on a couch. Due to its immense popularity, it also became a victim of major attacks unfortunately and these
attacks have increased manifold after the spread of novel Covid‐19. Internet was never designed keeping security in mind
as it was assumed that people would not misuse the technology but use it for noble purpose i.e. communicating and
sharing information with people worldwide. Due to its lack of security, internet also has its own fair share of disadvantages
which has caused the demands for cybersecurity to soar. Cybersecurity standards and protocols protects the internet on
individual and organizational level ranging from protecting individual's personal information to securing critical
infrastructures like power plants, hospitals and financial companies. I am honored that I am part of cybersecurity field and I
wish to augment my knowledge to gain in‐depth experience in this field by pursuing my post graduation from your
university.
My under graduation in Information Technology from NIT Srinagar gave me an opportunity to gain initial knowledge in
Information Security in 7th semester where I successfully scored 8 out of 10. This made me decide that it was a path I
wanted to pursue deeply in future. In this course I did socket programming in Python, learnt various communication
protocols, OSI Model, cryptography algorithms, digital signatures, secure protocols for HTTP, IP, SMTP etc. Here, I got to
know the logic and rules behind these protocols which helps to secure the network. Apart from my technical skills, I also
used to do theatre and the artist inside me also want to learn about different cultures.
After my graduation, I initially worked as a Web Developer for few years in Ummira Pvt Ltd. However, I decided to focus
more on security testing as I found it more interesting than development. But mere academic knowledge wouldn't have
sufficed to get a job opportunity in cybersecurity field because to gain an overall picture of a firm's IT security, a person
needs to have experience of both blue team monitoring and red team testing. Therefore, I decided to join an internship in
Supraja Technologies where I learnt about in Ethical Hacking and Web Penetration Testing to explore the offensive side of
security by exploiting the vulnerabilities in the web applications with help of automated tools and self‐made scripts. For
blue teaming, I joined SOC Experts training programme to learn about SOC operations. After my internship , I started
working at Sequretek IT Solution Pvt Ltd and gained vast experience under various profiles like SOC Incident Responder
and Endpoint Security Engineer. The professional experience helped me not only to apply my knowledge in practical but
also I got to explore more about different domains of cybersecurity like Malware Research, Antivirus Evasion etc.
Germany has established itself one of the forerunner in IT industry especially in Europe in terms of cybersecurity, as its
National Cybersecurity index reaching rank 16th amongst 160 countries.. Furthermore, higher studies education in
Germany, especially in IT, is affordable with advanced education quality at par with current IT technologies which
motivated me to enroll for my post‐graduation. Not only this, but job prospects after post‐graduation is equally mouth‐
watering as they offer a period of 18 months for look for job opportunities. Moreover, lifestyle of Germans is something
that also fascinates me as they are known for their punctuality and hard work. good work‐life balance.
After ample research, I have found your university gives right amount of technical exposure with amazing computer lab
facilities that would fulfill all my needs regarding research. The syllabus of the course furnished on the website was
excellent with its focus on modern technologies. Moreover, assimilation of global talent across the world, experienced
researchers and professors even motivated me further to apply for your university. This inclusiveness will help me to
Page 2
expedite my comprehensive growth as a security expert. Furthermore, during my professional career , I wish to do a in‐
depth analysis in various topics likes Antivirus Evasion using ML, Malware Research etc. which is not possible during a job
as you have a set of responsibilities to fulfill.
After completing this course and acquiring adequate experience and insights into the field, I will look forward for job
opportunities as in cybersecurity field and in long term would like to see myself as a CISO in a reputed company. If by the
grace of god everything goes according to the plan, I will also venture into the dream of starting my own firm. This
international qualification will equip me with the strength and confidence to take up such an ambitious dream. I look
forward to an exciting and gratifying association with your prestigious University.

Matched Source

Similarity 3%
Title:sopwritingonline.com › sop‐for‐ms › cyber‐securitySOP for MS in Cyber Security | Examples, Pdf
I want to shift my career to a company that focuses exclusively on cybersecurity services. After acquiring adequate
experience and insights into the field, I will venture into the dream of starting my own firm. This international qualification
will equip me with the strength and confidence to take up such an ambitious dream.
https://sopwritingonline.com/sop‐for‐ms/cyber‐security//

Similarity 3%
Title:SOP for MS in Cyber Security | Examples, Pdf
This international qualification will equip me with the strength and confidence to take up such an ambitious dream. I look
forward to an exciting and gratifying association with your prestigious University.” Download Pdf. NOTE: The SOP given
above is only an example for students seeking admission in Cyber Security at universities outside. Do not use it as such for …
https://sopwritingonline.com/sop‐for‐ms/cyber‐security/

You might also like