{"id":334,"date":"2026-05-05T17:29:58","date_gmt":"2026-05-05T17:29:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/?page_id=334"},"modified":"2026-05-05T18:04:38","modified_gmt":"2026-05-05T18:04:38","slug":"cybersecurity-professional-career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/cybersecurity-professional-career-paper\/","title":{"rendered":"Cybersecurity Professional Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Cybersecurity Professional Career Paper:<br>Penetration Tester<br>Student Name: Deonta Carmack<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S: Cybersecurity and the Social Sciences<br>Instructor Name: Professor Yalpi<br>Date: 4\/14\/2026<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Introduction<br>Penetration testing is one of the most dynamic and human\u2011centered careers in cybersecurity.<br>While the role is often associated with technical skills such as vulnerability scanning, exploit<br>development, and network analysis, the profession also relies heavily on understanding human<br>behavior. In today\u2019s digital environment, cyberattacks frequently exploit psychological<br>weaknesses rather than purely technical flaws, making social science principles essential to the<br>penetration tester\u2019s work. This paper examines how penetration testers integrate social science<br>research into their daily routines, how the profession interacts with marginalized groups, and<br>how key concepts from CYSE 201S apply to this career.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Social Science Principles<br>Penetration testers depend on social science research to understand the motivations, behaviors,<br>and decision\u2011making patterns of both attackers and end users. For example, psychological studies<br>on risk perception help testers anticipate how employees might respond to suspicious emails or<br>unexpected system prompts. Research on hacking subcultures and cybercriminal motivations<br>provides insight into how real adversaries think, which helps testers design realistic attack<br>simulations.<br>Human\u2011computer interaction (HCI) is another critical social science area that shapes penetration<br>testing. Testers must understand how users navigate systems, where confusion is likely to occur,<br>and how interface design can unintentionally create security vulnerabilities. Social engineering, a<br>core component of many penetration tests, is itself grounded in behavioral psychology,<br>persuasion theory, and communication studies. When testers craft phishing emails or conduct<br>pretexting calls, they rely on principles such as authority bias, urgency cues, and trust\u2011building<br>techniques.<br>Penetration testers also use social science insights to design effective awareness training. By<br>understanding how people learn, what motivates behavioral change, and why individuals ignore<br>security policies, testers can help organizations build more resilient human defenses.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Application of Key Concepts<br>Several concepts from CYSE 201S directly apply to penetration testing. Threat modeling helps<br>testers identify the most likely human\u2011driven attack vectors, such as phishing or credential reuse.<br>Risk assessment frameworks guide testers in evaluating which vulnerabilities pose the greatest<br>threat based on user behavior and organizational culture.<br>The concept of social engineering is central to penetration testing. Testers apply theories of<br>human behavior to simulate realistic attacks, demonstrating how easily individuals can be<br>manipulated into revealing sensitive information. Concepts related to ethics, privacy, and legal<br>compliance also shape the profession. Penetration testers must follow strict rules of engagement,<br>obtain written authorization, and ensure that their activities do not harm employees or violate<br>privacy laws.<br>Tools such as the NIST Cybersecurity Framework, MITRE ATT&amp;CK, and behavioral analytics<br>platforms demonstrate how social science and technical methods intersect. These tools help<br>testers understand not only how systems fail but also how people contribute to security<br>weaknesses.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Marginalization<br>Penetration testing intersects with issues of marginalization in several ways. Marginalized<br>groups, including low\u2011income individuals, elderly populations, and communities with limited<br>Digital literacy is disproportionately targeted by phishing, fraud, and identity theft. When<br>Penetration testers design social engineering assessments; they must be aware of these disparities<br>to avoid reinforcing harm or bias.<br>The profession is also working to address underrepresentation within cybersecurity. Women,<br>racial minorities, and individuals from disadvantaged backgrounds remain significantly<br>underrepresented in penetration testing roles. Many organizations now support diversity<br>initiatives, mentorship programs, and inclusive hiring practices to broaden participation in the<br>field. Additionally, penetration testers contribute to equitable digital protection by advocating for<br>accessible training materials and security policies that consider the needs of all users.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Career Connection to Society<br>Penetration testers play a vital role in protecting the digital infrastructure that society depends on<br>on. By identifying vulnerabilities before malicious actors exploit them, testers help safeguard<br>financial systems, healthcare networks, government services, and critical infrastructure. Their<br>work strengthens public trust in digital services and reduces the likelihood of large\u2011scale<br>breaches that could disrupt society.<br>Public policies such as data protection laws, cybersecurity regulations, and national security<br>directives shape the responsibilities of penetration testers. These policies influence how tests are<br>conducted, how data is handled, and how organizations must respond to discovered<br>vulnerabilities. As cyber threats continue to evolve, penetration testers remain essential to<br>maintaining societal stability and digital resilience.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Scholarly Journal Articles<br>Source 1: A scholarly article on social engineering effectiveness may highlight how<br>psychological principles influence user susceptibility. These findings support the paper\u2019s<br>discussion of behavioral science in penetration testing.<br>Source 2: Research on digital inequality or marginalized groups may show how certain<br>populations face higher cybersecurity risks. This supports the section on equitable protection and<br>the profession\u2019s responsibility to address disparities.<br>Source 3: An article examining cybersecurity\u2019s role in critical infrastructure or organizational<br>Resilience can reinforce the societal importance of penetration testing and its connection to the public<br>policy.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Conclusion<br>Penetration testing is a cybersecurity career that blends technical expertise with deep social<br>science understanding. By analyzing human behavior, applying key concepts from CYSE 201S,<br>and addressing the needs of marginalized groups, penetration testers help organizations<br>strengthen their defenses and protect society at large. As cyber threats grow more sophisticated,<br>the integration of social science principles will remain essential to the success and ethical<br>practice of penetration testing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Professional Career Paper:Penetration TesterStudent Name: Deonta CarmackSchool of Cybersecurity, Old Dominion UniversityCYSE 201S: Cybersecurity and the Social SciencesInstructor Name: Professor YalpiDate: 4\/14\/2026 IntroductionPenetration testing is one of the most dynamic and human\u2011centered careers in cybersecurity.While the role is often associated with technical skills such as vulnerability scanning, exploitdevelopment, and network analysis, the profession also&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/carmackdeonta\/cybersecurity-professional-career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":31917,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/users\/31917"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages\/334\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/pages\/334\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carmackdeonta\/wp-json\/wp\/v2\/media?parent=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}