Friday, March 29, 2024
CREAM Scholarship Program in Secure Embedded Systems 2019
Created By: Morgan State University
 
CREAM Scholarships sponsored by the DoD Cybersecurity Scholars Program

Student Application including all materials must be completed and received by February 16, 2019 at 11:00PM EST

 
1.Full name

2.Email address

3.Download, complete and upload Attachment D.
     
Note any recognition, honors, and awards: Include any scholarships, academic or research honors and awards, and any other recognition relevant to your field since entering college. Click Add More Information to enter additional recognitions.
  1. Number of recognition, honor, award
  2. Description of recognition, honor, award
  3. Name of Agency or Organization granting award
  4. Year award granted
4.Download and attach completed Awards Sheet. Make sure your name and the name of your institution is noted at the top of each page.
     
You must attach two (2) Letters of Reference to this supplemental statement from persons knowledgeable of your potential for successful learning, as well as your knowledge and ability. At least one of these letters must be from a current faculty member [or a most current faculty member], and the second letter may be from either a current or former faculty member, or a current or former employer. Each letter must contain the name, position or title, telephone number, email address, and institutional or organizational address of the referee. Each letter must include a letterhead. In addition, you must request that each referee refer to and address the following factors:
     
  • The relationship of the referee to you. (The referee states whether the information is based on anacademic or employment relationship.)
  • The length of the relationship. (The referee states how long he or she has known you.)
  • An assessment of your potential for academic and fulfillment of degree requirements.(Advise your referees that your college or university will base a determination of your academic sufficiency, in part, on the letters of reference that you submit.)
  • An assessment of your knowledge and ability following the six (6) competency areas listed in Section F on the Attachment D form
5.Attach your two (2) letters of recommendation
6.Attach your resume
     
Attach a copy of your unofficial transcript. Your unofficial transcript will be used for preliminary review of eligibility.
7.Attach your unofficial transcript
     
Please note that applications will not be fully processed without receipt of an official certified transcripts. Certified transcripts must be received by February 16, 2019 by 11:00 PM EST.. Electronic transcripts can be sent to Michel.reece@morgan.edu (VERY IMPORTANT!: Transcripts must be sent from the institution, not the applicant!) . Hardcopy transcripts can be sent to Dr. Michel Reece, Morgan State University, Schaefer Engineering Building, Room 336, 5200 Perring Parkway, Baltimore, MD 21251
8.Check this box if you have forwarded a copy of your certified official transcript to Dr. Michel Reece
Yes, I have forwarded a copy of the certified
     
Supplemental Competency Statement: Knowledge, Skills and Attributes
     
Describe your competency in the sheet provided. (This corresponds to Section F in Attachment D. ) Describe your knowledge and ability in each of the six (6) competency areas below. The evaluation points are very high in this area. You must address each area identified. If you do not provide this information your package will be deemed non-responsive and will not be considered. Indicate your name and school name on each page. Limit your responses on all six competency areas to a total of three pages.


Competency Areas:
     
A) Knowledge of the techniques of the cybersecurity discipline, including encryption, access control, physical security, training, threat analysis, and authentication
     
B) Knowledge of the human factors in cybersecurity, including human computer interaction,design, training, sabotage, human error prevention and identification, personal use policies, and monitoring.
     
C) Ability to identify and analyze problems, distinguish between relevant and irrelevant information to make logical decisions, and provide solutions to individual and organizational problems.
     
D) Ability to consider and respond appropriately to the needs, feelings, and capabilities of differentpeople in different situations is tactful, compassionate and sensitive, and treats others with respect.
     
E) Ability to make clear and convincing oral presentations to individuals or groups listens effectively and clarifies information as needed facilitates an open exchange of ideas and fosters an atmosphere of open communication.
     
F) Ability to express facts and ideas in writing in clear, convincing and organized manners appropriate to the audience and occasion.
9.Download, complete and upload the Competency Sheet
10.Describe in a 200 words or less a) Why you are interested in secure embedded systems and/or cybersecurity? B) Describe your current or desired research activities in secure embedded systems/cybersecurity.
11.Are you an undergraduate student?
Yes
No

   
Preview, Save or Print