{"id":213,"date":"2025-11-26T20:58:16","date_gmt":"2025-11-26T20:58:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/?page_id=213"},"modified":"2025-11-26T21:03:25","modified_gmt":"2025-11-26T21:03:25","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Chase Lawson<br>10\/23\/2025<br>CYSE 201<br>Ethical Hacking<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left\">                                                      Introduction<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Professionals in this field use social science principles to understand human<br>behavior and design human-centric security measures. Ethical Hacking refers to an<br>individual who is known as a hacker but instead of using it for nefarious purposes they<br>attempt to detect and mitigate threats. They do this by what\u2019s called penetration testing.<br>They attempt to find holes in security networks and various flaws within the network. They<br>are known as freelance contractors, meaning that they do not necessarily work for the<br>company, however they are still compensated for their work. Once they have completed<br>their testing they will report back their findings to the company. In this paper I will discuss<br>how social science applies to ethical hacking.<br>Ethical Hackers Thinking Like Hackers<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Ethical Hacking focuses on human behavior and observes the motives behind a<br>cybercriminals attack on a company. There are a few reasons why cybercriminals attack<br>companies. One reason would be they feel bored, or hacking strikes their curiosity. These<br>types of hackers often use what\u2019s called \u201cscript kiddies\u201d which are pre-written scripts and<br>tools to deploy cyberattacks. Although they didn\u2019t write the malicious code themselves in<br>many ways it can still harm a company. Another reason for a potential attack would be<br>cybercriminals see a challenge like a puzzle that needs to be solved. Overtime hackers<br>develop a skillset and would like to use those skills to hack companies and see what they<br>can do. Some hackers would like to gain notoriety or clout from hacking to get the attention<br>of some sort of group or club. Across the world there are many hacking clubs and<br>organizations that scout out other hackers with unique abilities and that can be useful<br>when attempting to hack large corporations.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Hackers analyze systems from di\udbc0\uddaferent perspectives, looking for weak points. They<br>think critically about how systems interact and where vulnerabilities might exist. Ethical<br>Hackers come up with solutions based on what a cybercriminal would do. Ethical Hackers<br>learn common attack techniques like phishing and SQL injections and password cracking<br>and brute force attacks.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">                                                  Conclusion<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">There are many ways that ethical hacking coincides with social sciences.<br>Psychology is used to try to understand how a hacker would think. Thinking like a hacker<br>requires critical thinking and persistence. By understanding both attackers\u2019 motivations<br>and victims\u2019 vulnerabilities, ethical hackers can anticipate threats. What their motives are<br>and what the hackers stand to gain. Adopting the hacker mindset with a strong emphasis<br>on empathy ensures a well-rounded approach to ethical hacking. Ethical Hacking uses<br>social sciences to help mitigate and possibly prevent a cyber-attack.<br>https:\/\/brandefense.io\/blog\/dark-web\/the-psychology-of-a-hacker-profiling-theminds-<br>behind-cyber-attacks\/<br>https:\/\/securemyorg.com\/how-to-think-like-a-hacker-ethical-hacking\/<br>Behind Ethical Hacking<br>\uf0b7 By Clinton Nwezeaku<br>\uf0b7 on January 28, 2025<br>\uf0b7 ethical hacking<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chase Lawson10\/23\/2025CYSE 201Ethical Hacking Introduction Professionals in this field use social science principles to understand humanbehavior and design human-centric security measures. Ethical Hacking refers to anindividual who is known as a hacker but instead of using it for nefarious purposes theyattempt to detect and mitigate threats. They do this by what\u2019s called penetration testing.They attempt &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/career-paper\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Career Paper<\/span><\/a><\/p>\n","protected":false},"author":31284,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages\/213"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/users\/31284"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages\/213\/revisions"}],"predecessor-version":[{"id":219,"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/pages\/213\/revisions\/219"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chase-cyse201s\/wp-json\/wp\/v2\/media?parent=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}