Home  >  Subjects  >  Film / Movies / Television  >  current page My Profile

Grant Proposal for it Veteran StudentsGrant Proposal

Pages: 15 (4584 words)  |  Style: n/a  |  Sources: 15

Custom Writing

Scholarship for Service Proposal

REQUEST FOR PROPOSAL

SCHOLARSHIP FOR SERVICES

The National Science Foundation in combination with the National Science and Technology Council bring forth the Cyber Corps (R): Scholarship for Service (SFS) program, which is pursuant of proposals that take into consideration cyber security education and workforce development. The main objective of this Request for Proposal is to track down and pinpoint the source that will provide the best general value to the National Science Foundation with regard to enhancing the education system in cyber security as well as the growth and progression of the workforce. Our goal as the National Science Foundation encompasses the recruitment and training of the forthcoming generation of professionals in the information technology field, specialists in industry control system security and security managers. Whereas being a student in cyber security is a significant factor, other criteria will form the basis of the awarding decision (National Science Foundation, 2014). This will be more comprehensively outlined in the subsequent evaluating factors segment of this RFP below.

Background

Cyberspace is an international virtual community facilitated by hyper-linked digital structures and has changed the everyday lives of people. Groups, families and their associates irrespective of distance and location can see and communicate with each other as though they are in the same area. Cyber economies generate new prospects. Each segment of the social order, each discipline, has been altered by cyberspace. In the present day, it is not alarming that cyberspace is significant and vital to our national primacies in business, schooling, energy, financial services, healthcare, industrialization, and defense (National Science Foundation, 2014). The hurry to espouse cyberspace, nonetheless, has brought out its instability in the open (National Science Foundation, 2014). The risks of hyper-connection have come to be agonizingly palpable to all and sundry. The privacy of individually distinguishable information is time and again disrupted on a substantial scale by unknown individuals. Our competitive edge is worn by the exfiltration of substantial intellectual property. In addition, law enforcement is staggered by the trouble of provenance, national borders, and tentative legal and ethical contexts. All these apprehensions presently impact the people's trust of cyberspace and the capacity of institutions to live up to their missions (National Science Foundation, 2014).

The National Science Foundation in collaboration with The National Science and Technology Council published and submitted a report in 2011 dubbed "Trustworthy Cyberspace: Strategic Plan for the Federal Cyber-Security Research and Development Program" (National Science Foundation, 2014). In particular, this plan delineates a comprehensive, organized research program to make cyberspace protected and dependable. It is imperative for the research in cyber security to change the game, evaluate and assess the misappropriations of cyber technology, strengthen education and teaching in cyber security, institute a science of cyber security, and changeover auspicious cyber security research into real world practice (National Science Foundation, 2014). In addition, the NFS adds on to the efforts undertaken by numerous agencies for the National Initiative for Cyber-Security Education (NICE), a program being undertaken by the White House (Young, 2016). The objective of both of these initiatives is to make certain that cyberspace is worthy of the trust from the general public (National Science Foundation, 2014). The solicitation gives recognition and acknowledgement that cyber-security education in combination with workforce development create a vital element for an effective execution and changeover to practice of any progressions in research and development of cyber-security (National Science Foundation, 2014).

Submission Guidelines and Requirements

The proposers who respond to this request for proposal might choose to submit their proposals in reaction to this SFS program through two ways, which are through the Grants.gov or the NSF Fast Lane system (National Science Foundation, 2016).

i. Submissions of Complete Proposals through the Fast Lane system

Submissions of complete proposals in response to this particular program petition ought to be prepared and submitted in agreement with the overall course of action kept in check in the NSF Grant Proposal Guide. This can be electronically obtained in the National Science Foundation website. Proposers are prompted to ascertain this program solicitation figure in the program solicitation segment on the NSF Cover Sheet for Proposal to the National Science Foundation. Amenability with this condition is vital to ascertaining the pertinent proposal handling guiding principles. The lack of submitting this information might defer processing (National Science Foundation, 2016).

ii. Submissions of Complete Proposals through the Grant.gov Way

Submissions of complete proposals in response to this particular program petition ought to be prepared and submitted in agreement with the overall course of action kept in check in the NSF Grants.gov Application Guide. This information can be obtained on both the NSF website as well as the Grants.gov website (National Science Foundation, 2016).

Project Description

It is debatable that cyber-security is the most significant challenge that the society is facing in the present information age. The individuals and also the government are not exempted from the depredations of malevolent cyber actions upon deficient and lacking technologies. Posturing cyber conflict exclusively in terms of standard assailants and guardians shortchanges the multiplicity and intricacy of the incentives, motivations, ethics, irregularities, and stratagems of the component players and actors in cyberspace. The intellectual challenger, regardless of whether it is a human or software, acquires and advances to exploit, disturb, and override (Evans et al., 2016). Taking this challenge into consideration necessitates a collaborated strategy between several disciplines, adding to the vast amount of knowledge on cyber-security in several disciplines, and resulting in real-world technologies that can be deployed. These determinations necessitate a ground-breaking and well-organized cyber-security education system that will generate the unparalleled and unmatched cyber-security labor force vital to the United States nationwide security, sustained economic growth and future high-tech modernization in secure cyberspace.

The Cyber Corps (R): Scholarship for Service (SFS) program is welcoming and accepting proposals that encompass and take into consideration cyber-security education and workforce development. In particular, the Scholarship Track makes funding available to Institutions for granting scholarships to students in cyber-security. In response to their scholarships, the beneficiaries are expected to work subsequent to their graduation for a Federal, State, Local, or Tribal Government organization in a job position that is interrelated to cyber-security for a period equivalent to the span of the scholarship. The Capacity Track searches for ground-breaking proposals resulting in a rise in the capacity of the United States higher education initiative to generate and yield cyber-security professionals (Deloitte, 2015).

Scholarship Track

The Scholarship for Service (SFS) program provides funding for student scholarships for supporting education in fields that are pertinent to cyber-security. In return, these students that attain the scholarships have to come to an understanding that they will work for the Federal Government once they graduate. However, this is cause to undergo approval and consent of the NSF program office, for a State, Local, or Tribal Government in a work position associated with cyber-security for a time period that is equivalent to the time span of the scholarship. In the course of the scholarship period, the students will take part in meaningful and important summer internships. In addition, the doctoral students are permitted to substitute or interchange their summer internships with a research activity subsequent to attaining a recommendation from their respective academic advisors and attaining approval and consent from the National Science Foundation program office.

The objective of the program is 100% assignment, which can only be realized by means of the active collaboration amongst all of the parties that are involved. Whereas the students taking part in the SFS are accountable for their own individual job searches, the SFS program office, via the U.S. Office of Personnel Management (OPM), makes available numerous implements to help in the job hunt and arranges a job fair every single year. The students are expected to enthusiastically take part and engage with OPM in order to attain a placement and employment in a Federal, State, Local or Tribunal Government organization. In addition, the students also have to take part in other Scholarship for Service (SFS) activities, for instance, workshops, seminars and conferences. These activities are purposed at growing and developing a community of practice that will advance the individual and collective skills of the students in a field progressively significant to the security of the United States.

U.S. Office of Personnel Management (OPM) works in partnership with National Science Foundation in this program by providing internship and assignment support to SFS scholarship students. This is by matching up the changeover of the students into government employment, by observing students' amenability with program necessities, and by evaluating whether the program aids meet the employee requirements of the Federal government for information infrastructure safety. Scholarship support is provided to students who efficaciously compete in a selection procedure that is developed, who meet the Scholarship for Service eligibility criteria, and who are long-established as competent for employment in the Federal Cyber Service by OPM. It is anticipated that the doctorate participants for the SFS program will attain their degree within a period of two years from the start… [END OF PREVIEW]

Download Full Paper (15 pages; perfectly formatted; Microsoft Word file) Microsoft Word File

Disabled Veteran Outreach Program


Coping Mediates the Relationship Between Personality Traits and PTSD in Combat Veterans


Importance of Standard Phraseology in Aviation


Homelessness, Mental Illness and the Failure of


Cities in International Politics


View 24 other related papers  >>

Cite This Paper:

APA Format

Grant Proposal For It Veteran Students.  (2016, March 18).  Retrieved May 29, 2017, from http://www.essaytown.com/subjects/paper/grant-proposal-veteran-students/4550132

MLA Format

"Grant Proposal For It Veteran Students."  18 March 2016.  Web.  29 May 2017. <http://www.essaytown.com/subjects/paper/grant-proposal-veteran-students/4550132>.

Chicago Format

"Grant Proposal For It Veteran Students."  Essaytown.com.  March 18, 2016.  Accessed May 29, 2017.
http://www.essaytown.com/subjects/paper/grant-proposal-veteran-students/4550132.

Disclaimer