{"id":149,"date":"2025-09-21T01:16:37","date_gmt":"2025-09-21T01:16:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2026-05-06T02:07:15","modified_gmt":"2026-05-06T02:07:15","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cortinez\/skills\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Cybersecurity Professional Career Paper:&nbsp;<strong>Ethical Hacker<\/strong>&nbsp;<\/p>\n\n\n\n<p>Benjamin Cortinez&nbsp;<\/p>\n\n\n\n<p>School of Cybersecurity, Old Dominion University&nbsp;<\/p>\n\n\n\n<p>CYSE 201S: Cybersecurity and&nbsp;the Social&nbsp;Sciences&nbsp;<\/p>\n\n\n\n<p>14 Apr 2026&nbsp;<\/p>\n\n\n\n<p><strong>Introduction:&nbsp;<\/strong>When we look at the world of cybersecurity, from the outside looking&nbsp;in, it seems like a&nbsp;clean cut&nbsp;case of what it is they do.&nbsp;These professionals are the safeguards&nbsp;to a gold mine of&nbsp;information stored on digital servers.&nbsp;Unbeknownst to many&nbsp;(including me) before this class, there&nbsp;is&nbsp;many&nbsp;levels and positions&nbsp;to&nbsp;the world of cybersecurity. The one&nbsp;that caught my attention the most is an ethical hacker (Penetration Tester).&nbsp;This&nbsp;position&nbsp;will&nbsp;be a hacker within the company that&nbsp;is authorized&nbsp;to&nbsp;find vulnerabilities before an outside entity is able to&nbsp;find the same vulnerabilities with no good intentions.&nbsp;With everything in modern times&nbsp;going digital like medical files, everything requiring a subscription that includes credit card information, the necessity for&nbsp;protection&nbsp;in the digital world is greater now than ever before and will only keep growing&nbsp;in the future.&nbsp;<\/p>\n\n\n\n<p><strong>Social Science Principles:&nbsp;<\/strong>When&nbsp;we&nbsp;take a look&nbsp;at how social science and ethical hacking are tied together, it is used in a way to predict how&nbsp;a security&nbsp;specialists will react to a simulated attack, to show how&nbsp;they\u2019ll stack up against a real attack, in other words it is a type of behavioral psychology.&nbsp;People have&nbsp;different reasons&nbsp;for&nbsp;unethical&nbsp;hacking, it could be a&nbsp;deep rooted&nbsp;problem stemming from childhood rebellious stage&nbsp;that was never grown out of, it could be to gain financial status that one thought was never achievable&nbsp;or something as simple as social status.&nbsp;Whereas ethical hackers are doing the same thing but&nbsp;just for the&nbsp;opposite reasons.&nbsp;While taking a deeper&nbsp;look&nbsp;this section&nbsp;lets&nbsp;take a look&nbsp;at&nbsp;the most dreaded (in my opinion) step of security, 2 step verification.&nbsp;As much good as I know it is to be used&nbsp;for&nbsp;I am also aware that&nbsp;people will willingly find a workaround&nbsp;of the&nbsp;2 step&nbsp;verification that will unknowingly cause multiple&nbsp;security breaches.&nbsp;<\/p>\n\n\n\n<p><strong>Application of Key Concepts:&nbsp;<\/strong>When we look at risk&nbsp;assessments as&nbsp;students&nbsp;we are understanding&nbsp;that&nbsp;something simple as a software bug after an update&nbsp;isn\u2019t&nbsp;just a&nbsp;stroke of \u201cluck\u201d but&nbsp;possibly how&nbsp;a&nbsp;organization or application shows that there is a&nbsp;possible weakness&nbsp;that can be targeted.&nbsp;Although ethical hackers might be tempted to backdoor these \u201cbugs\u201d for&nbsp;personal gain,&nbsp;often times&nbsp;they do not just as a nurse or doctor do not violate the&nbsp;HIPAA laws, which ties into the concept of privacy ethics. Something as simple as privacy ethics can test the strongest individuals when it comes to the possible personal gain vs their ethics when everything is at the tip of their fingers.&nbsp;<\/p>\n\n\n\n<p><strong>Marginalization:&nbsp;<\/strong>The impact of cybersecurity&nbsp;in a marginalized group is, to me, a weird topic.&nbsp;By&nbsp;definition&nbsp;a&nbsp;marginalized group is one that is underserved&nbsp;and&nbsp;often times&nbsp;excluded in society due to education,&nbsp;wealth&nbsp;or political reasons. Since they are underserved, which often means less security or knowledge, this group is like fish in a barrel to attackers.&nbsp;They are often seen as the most vulnerable due to limited access to proper security.&nbsp;<\/p>\n\n\n\n<p><strong>Career Connection to Society:<\/strong>&nbsp;If we take a quick look at ethical hackers, I do not believe that it would be&nbsp;to&nbsp;far&nbsp;fetched&nbsp;to compare them to doctors or scientists. In the sense that both&nbsp;previously mentioned careers are either looking for the weakness in the immune system&nbsp;or&nbsp;attempting&nbsp;to strengthen the immune system&nbsp;by finding a weakness in the immune system. Ethical hackers are doing the same thing but instead of a living organism, they are doing the same exact thing on a virtual machine. Both are fighting&nbsp;viruses&nbsp;but an ethical hacker&nbsp;must stop said virus before more than just one person is affected, and to ensure millions or billions of dollars are not&nbsp;effected. (I understand health care workers are also&nbsp;attempting&nbsp;to ensure&nbsp;that the virus does not spread to multiple&nbsp;people, I just&nbsp;couldn\u2019t&nbsp;find a way to put my thoughts into actual words. I love healthcare&nbsp;workers.)&nbsp;<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Professional Career Paper:&nbsp;Ethical Hacker&nbsp; Benjamin Cortinez&nbsp; School of Cybersecurity, Old Dominion University&nbsp; CYSE 201S: Cybersecurity and&nbsp;the Social&nbsp;Sciences&nbsp; 14 Apr 2026&nbsp; Introduction:&nbsp;When we look at the world of cybersecurity, from the outside looking&nbsp;in, it seems like a&nbsp;clean cut&nbsp;case of what it is they do.&nbsp;These professionals are the safeguards&nbsp;to a gold mine of&nbsp;information stored on digital&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cortinez\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":31489,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/users\/31489"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":362,"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/pages\/149\/revisions\/362"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cortinez\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}