{"id":369,"date":"2025-04-30T02:41:21","date_gmt":"2025-04-30T02:41:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/?page_id=369"},"modified":"2025-04-30T02:41:21","modified_gmt":"2025-04-30T02:41:21","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><strong>Title:<\/strong> The Career as a Penetration Tester in Cyber Security<br><\/p>\n\n\n\n<p><strong>BLUF<\/strong><br>A career as a penetration tester involves knowledge of human behaviors and<br>technology to collectively mitigate attacks and find any vulnerabilities before they are<br>exposed to cyberattacks. They not only protect networks and systems, but they also<br>defend marginalized groups in which they bridge the gap in the digital divide.<\/p>\n\n\n\n<p><br><strong>Introduction<\/strong><br>Cybersecurity is known to be deeply rooted in social science as well, because<br>the role of a penetration tester is a very important career in cybersecurity. The role of a<br>penetration tester involves imitating hackers to discover vulnerabilities within a network<br>or a system and assisting with improvements to strengthen those vulnerabilities. I plan<br>to elaborate on the role that a penetration tester plays in cybersecurity, including<br>education requirements and mindset, as well as how it relates to hacker subculture, the<br>use of honeypots, and challenges.<\/p>\n\n\n\n<p><br><strong>Education, Experience, and Mindset<\/strong> <\/p>\n\n\n\n<p>The role of a penetration tester requires multifaceted skills and expertise, not just<br>technical ones. As mentioned in module 5 of the course, \u201cA good cybersecurity<br>professional must have a rich and diverse skillset.\u201d They must have a strong<br>background in technology and cybersecurity. They may also be required to achieve<br>multiple certifications, such as PenTest+ and Certified Ethical Hacker (CEH), which will<br>show understanding of the skills needed to perform in this role. This provides a great<br>foundation for professional development. It is also recommended to have some<br>hands-on experience in the field as well, This can be done through Capture the Flag<br>Competitions and internships.<br>Penetration testers must think like criminals or attackers. Mindset is very<br>important, and they must be detail-oriented, problem solvers, and tenacious. They must<br>handle each incident with a strategic mindset and understand that although they must<br>think like a hacker, they also need to follow the law. There must also be a willingness to<br>learn; technology is changing every day, and new threats will continue to emerge. It is<br>important to keep your skills sharp through lifelong learning.<\/p>\n\n\n\n<p><br><strong>Understanding of Hacker Subculture<\/strong><br>Penetration testers are often referred to as \u201cethical hackers\u201d, meaning that they<br>explore vulnerabilities within a network or a system that could be exploited. They would<br>use the same hacker techniques to be able to test a system, the only difference is that<br>they have been given consent to do so. According to Merriam-Webster, a hacker is defined as \u201ca person who illegally gains access to and sometimes tampers with<br>information in a computer system\u201d and as \u201can expert at programming and solving<br>problems with a computer.<br>In Module 9 of the course, we explored a little of hacker subculture. &#8220;Hacker<br>culture emerged from a fusion of intellectual curiosity, counterculture and a hate-on for<br>any technology that you couldn\u2019t easily get access to or tamper with.&#8221; (Quora, 2017)<br>Comprehending hacker subculture plays an important part in the career of a penetration<br>tester; they are required to act and think like a hacker, but they also must follow the law.<br>With the use of simulations, they are also able to reenact attacks themselves, within a<br>controlled environment. This allows penetration testers to explore safely without putting<br>any assets or information at risk.<\/p>\n\n\n\n<p><br><strong>Use of Honeypots<\/strong><br>Penetration testers utilize honeypots. &#8220;Honeypots are used to lure cybercrooks<br>into a controlled environment, allowing threat experts and businesses to learn more<br>about complex cyber-attacks and how cybercriminals operate.&#8221; (Nemchick, 2024)<br>Module 3 further elaborated on honeypots, along with their advantages and<br>disadvantages. Advantages include the ability to study hacks and system trespassing in<br>real-time and grant the ability to apply changes to the honeypot to see how the hacker<br>responds. Some disadvantages include the difficulty of understanding motives, and that<br>sometimes the attacker isn\u2019t carried out by an individual, but via an automated attack or script. &#8220;Set up a honeypot, and you can lure hackers into a research environment. You&#8217;ll<br>watch everything an attacker does, and those insights can help you build an even<br>stronger system for your company.&#8221; (Okta, 2024)<\/p>\n\n\n\n<p><br><strong><em>Human Factors &amp; Interaction With Marginalized Groups<\/em><\/strong><br>Module 7 emphasized the role that human factors play in cybersecurity. Human<br>factors According to Hasib (2018), \u201cPeople are not the weakest link in cybersecurity;<br>they are the strongest weapon. The real problem is the failure of leadership to provide<br>appropriate support, education, and empowerment. According to the National Institutes<br>of Health (NIH, 2019), marginalized groups are those who face exclusion and<br>disadvantage across social, political, and economic systems. Often, they may<br>experience digital exclusion, which can come from the absence of technology and<br>resources. The role as a penetration tester requires them to protect all, as well as<br>marginalized groups that are severely affected by cyber-attacks. They can collaborate<br>with these groups and determine what vulnerabilities they face and how to prevent<br>them.<\/p>\n\n\n\n<p><br><strong><em>Conclusion<\/em><\/strong><br>The career of a penetration tester is very complex. You must understand the<br>mind of a hacker as well as human behavior. They expose vulnerabilities before they<br>can be exploited as well as defend marginalized communities by reducing digital exclusion. With a foundation in technology, ad hands-on experience, they can recreate<br>attacks in controlled environments and learn from them.<\/p>\n\n\n\n<p><br><strong><em>References<\/em><\/strong><br>\u201cBridging Digital Divides: Expanding Cybersecurity in Underserved Communities &#8211;<br>NASCIO.\u201d<br>NASCIO, 25 Apr. 2017,<br>www.nascio.org\/resource-center\/resources\/bridging-digital-divides-expanding-cy<br>bersecurity-in-underserved-communities\/. Accessed 15 Apr. 2025.<br>Chamlou, Nina. \u201cWhy Diversity in Cybersecurity Matters | CyberDegrees.org.\u201d<br>Www.cyberdegrees.org, 28 Feb. 2022,<br>www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/. Accessed 12 Apr.<br>2025.<br>Hasib, Mansur.<br>Cybersecurity as People Powered Perpetual Innovation. Academia.edu,<br>2018,<br>https:\/\/www.academia.edu\/74480255\/Cybersecurity_as_People_Powered_Perpe<br>tual_Innovation.<br>Irwin, Luke. \u201cEthical Hacking vs Penetration Testing: What\u2019s the Difference?\u201d IT<br>Governance Blog En, 4 Feb. 2020,<br>www.itgovernance.eu\/blog\/en\/ethical-hacking-vs-penetration-testing-whats-the-di<br>fference. Accessed 9 Apr. 2025.<\/p>\n\n\n\n<p>Lane, Patrick. \u201cPenetration Testing and Vulnerability Assessment: Working Together.\u201dDefault, 8 Sept. 2021,<br>www.comptia.org\/blog\/penetration-testing-and-vulnerability-assessment.<br>Accessed 12 Apr. 2025.<br>National Association of State Chief Information Officers. Cybersecurity in Underserved<br>Communities. NASCIO, Nov. 2024,<br>www.nascio.org\/wp-content\/uploads\/2024\/11\/NASCIO_Cybersecurity-in-Underse<br>rved-Communities_2024_a11y.pdf.<br>National Institute on Minority Health and Health Disparities. \u201cOverview.\u201d NIMHD, 2018,<br>www.nimhd.nih.gov\/about\/overview\/. Accessed 12 Apr. 2025.<br>Nemchick, Emily. \u201cWhat Is a Honeypot? Cybersecurity Traps Explained.\u201d What Is a<br>Honeypot? Cybersecurity Traps Explained, 7 Jan. 2024,<br>www.avg.com\/en\/signal\/what-is-a-honeypot. Accessed 13 Apr. 2025.<br>NICCS. \u201cWorkforce Framework for Cybersecurity (NICE Framework) | NICCS.\u201d<br>Niccs.cisa.gov, 28 Aug. 2023,<br>niccs.cisa.gov\/workforce-development\/nice-framework. Accessed 13 Apr. 2025.<br>\u201cOkta, Inc.\u201d Okta.com, 31 Aug. 2024, www.okta.com\/identity-101\/honeypots\/. Accessed<br>10 Apr. 2025.<\/p>\n\n\n\n<p>Quora. \u201cWhere Did Hacker Culture Come From?\u201d Forbes, 7 Sept. 2017,<br>www.forbes.com\/sites\/quora\/2017\/09\/07\/where-did-hacker-culture-come-from\/.<br>Accessed 13 Apr. 2025.<br>University of Michigan. \u201cPenetration Testing (Ethical Hacking) \/<br>Safecomputing.umich.edu.\u201d Safecomputing.umich.edu,<br>safecomputing.umich.edu\/protect-the-u\/protect-your-unit\/vulnerability-manageme<br>nt\/ethical-hacking. Accessed 11 Apr. 2025.<br>\u201cVulnerability Assessment Analyst | CISA.\u201d Www.cisa.gov,<br>www.cisa.gov\/careers\/work-rolesvulnerability-assessment-analyst. Accessed 12<br>Apr. 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: The Career as a Penetration Tester in Cyber Security BLUFA career as a penetration tester involves knowledge of human behaviors andtechnology to collectively mitigate attacks and find any vulnerabilities before they areexposed to cyberattacks. They not only protect networks and systems, but they alsodefend marginalized groups in which they bridge the gap in the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":30517,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/369"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/users\/30517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/369\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/pages\/369\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/media?parent=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}