The question I’ve been asked is, why are you interested in cybersecurity technology? To answer this ill give you the story that started it all. Since I was a child I’ve had three loves in life other than my family. The first is God and America I am a huge patriot, the second is cars or anything with a motor in it, the third is computers and technology in general. I’m a gear head, when I was in high school I took a small engines class and got my boating licenses from there. I love to build, restore and modify anything with a motor in it, this led me to fix wiring and learning the computers and what controls the mechanics of the vehicle. In turn, this led me to learn about any and all technology and software such as Windows and Linux. This of course got me into coding and making programs for small robots I built for fun. When I was in high school I attended the Advance Technology Center and graduated with multiple certificates and awards in the field of telecommunications. My teacher Mr. Stover and someone I hold dear to me also thought us more than telecommunications. He taught us computers, some electrical work, safety in construction through OSHA, and even how to do our taxes. I share all these things to show you from the beginning I’ve always had a love for technology and mechanics. Unfortunately, my Father and I got hacked and our accounts solen, this included passwords, emails, and very sensitive material. We began receiving emails from the hacker and the person was making purchases on our accounts. This of course no one should go through and it was so frustrating and whoever the hacker was is still out there somewhere. This is what drove my love for cybersecurity technology, I’ve looked at how the hacker could have gotten into our accounts. My theory is he used a reverse shell by a clickable link that he disguised to be an Amazon link, it was a .desktop file which when clicked brought up the Amazon website, but in the background allowed a connection to the hacker’s laptop. Once the link was clicked on, my Dad’s computer sent a signal out the firewall from our internet to hackers’ computer. Then he used proxychains to change and hide his location and where his IP address is coming from. You can use software such as nano cat or python to work in the background and keep a connection between the computers, thus he was able to access all the devices on our internet connection and do what he or she pleased. All this I learned on my own and after getting an associate’s degree in business management and administration. I was off to ODU and I picked Cybercrime as my major. I hope to learn and further my education and hopefully join the CIA and protect my country from cyber attacks. If anything I’m a patriot and will do what it takes to protect my country. As technology advances wars will be fought over the web and I will be the one to stop it.