{"id":292,"date":"2025-02-03T23:25:28","date_gmt":"2025-02-03T23:25:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/?page_id=292"},"modified":"2025-04-22T13:55:06","modified_gmt":"2025-04-22T13:55:06","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-align: center;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Penetration into the Social Sciences<\/span><\/p><\/span><\/h2>\n\n\n\n<p><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">BLUF: Penetration testers, or more widely known as Ethical hackers, use all types of skills and resources to understand and react to the world of cybersecurity.<\/span><\/p><\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-align: center;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Cybersecurity as a Whole<\/span><\/p><\/span><\/h2>\n\n\n\n<p><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Cybersecurity is heavily affected by other fields, and makes it an interdisciplinary field. It uses information from the other fields to understand how to take care of cyberspace. One example of this is in relation to the criminology field; where it describes why criminals act or react to certain situations. This helps the cybersecurity field to understand why hackers commit crimes and how they can be potentially stopped. Just stopping the hackers with theories or studies does not always do the job, therefore ethical hackers were created. They use the same methods as malicious hackers, but instead of causing harm to people, they use those skills to improve security (National Cybersecurity Alliance, 2024).<\/span><\/p><\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-align: center;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Principles of Social Science<\/span><\/p><\/span><\/h2>\n\n\n\n<p><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\"><span class=\"Apple-tab-span\"> <\/span><\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Just like any other profession in cybersecurity, ethical hackers also use some of the principles of social science. The main principle they use is Ethical neutrality, and they implement this all throughout their career, hence the name ethical hacker. They can use their skills at any time to turn bad and start hacking into companies maliciously, but instead they decide to contribute to the greater good and make cyberspace more secure (CompTIA, 2022). Another principle they would need to use is Parsimony. Whenever an ethical hacker finds a vulnerability, they need to report it to the people they found it for, but sometimes the report needs to be explained more simply so it can be understood by everyone that is authorized to that information (Okta, 2024).<\/span><\/p><\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-align: center;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Ethical Hackers\u2019 Impact<\/span><\/p><\/span><\/h2>\n\n\n\n<p><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\"><span class=\"Apple-tab-span\"> <\/span><\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Ethical hackers can be used in any institution but is more focused on higher risk institutions like healthcare, corporations, and governments. These organizations hold a lot of data and sensitive information so an ethical hackers\u2019 impact on these organizations still helps the individual people by protecting their secured data. Since ethical hackers focus more on the technical side of cybersecurity, and deal with scripts and code, they aren\u2019t as focused on the social engineering or human error side of cybersecurity. They still have the ability to conduct a fake social engineering attack with consent from the victim to show them how easy or hard it can be exploited (Perdue Global, 2025).<\/span><\/p><\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-align: center;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Conclusion<\/span><\/p><\/span><\/h2>\n\n\n\n<p><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\"><span class=\"Apple-tab-span\"> <\/span><\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Ethical hackers are a key aspect in the security of data and cyberspace, but focused on the technical side of cybersecurity. They provide a new perspective to security because they need to break into a system with consent to show the vulnerabilities within that system. Since they use the same skills as a malicious hacker, some people are a little skeptical about them because what if they decide that they don\u2019t want to contribute to the greater good anymore. Despite this thought process of some individuals, ethical hackers are more on the rise to help big companies and even government agencies to get to the vulnerability before any malicious hackers get to it and use it harmfully.\u00a0<\/span><\/p><p dir=\"ltr\" style=\"line-height:2.4;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\"><span style=\"width:100px;position:relative\"><\/span><\/span><\/p><\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-align: center;margin-top:0pt;margin-bottom:0pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">References<\/span><\/p><\/span><\/h2>\n\n\n\n<p><span id=\"docs-internal-guid-0cf0ec07-7fff-f96e-a188-88865059d9cb\"><p dir=\"ltr\" style=\"line-height:2.4;text-indent: -36pt;margin-top:12pt;margin-bottom:12pt;padding:0pt 0pt 0pt 36pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">CompTIA. (2022, July 28). <\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;font-style: italic;vertical-align: baseline\">What is ethical hacking: Cybersecurity<\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">. CompTIA. http:\/\/www.comptia.org\/content\/articles\/what-is-ethical-hacking\u00a0<\/span><\/p><p dir=\"ltr\" style=\"line-height:2.4;text-indent: -36pt;margin-top:12pt;margin-bottom:12pt;padding:0pt 0pt 0pt 36pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">National Cybersecurity Alliance. (2024, August 15). <\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;font-style: italic;vertical-align: baseline\">The evolution of ethical hacking: From curiosity to cybersecurity<\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">. National Cybersecurity Alliance. http:\/\/www.staysafeonline.org\/articles\/the-evolution-of-ethical-hacking-from-curiosity-to-cybersecurity<\/span><\/p><p dir=\"ltr\" style=\"line-height:2.4;text-indent: -36pt;margin-top:12pt;margin-bottom:12pt;padding:0pt 0pt 0pt 36pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Okta. (2024, August 30). <\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;font-style: italic;vertical-align: baseline\">Ethical hacking: What it is &amp; examples<\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">. Okta. http:\/\/www.okta.com\/identity-101\/ethical-hacking\/\u00a0<\/span><\/p><p dir=\"ltr\" style=\"line-height:2.4;text-indent: -36pt;margin-top:12pt;margin-bottom:12pt;padding:0pt 0pt 0pt 36pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">Purdue Global. (2025, January 31). <\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;font-style: italic;vertical-align: baseline\">What is ethical hacking?<\/span><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">. Purdue Global. https:\/\/www.purdueglobal.edu\/blog\/information-technology\/ethical-hacker\/\u00a0<\/span><\/p><p dir=\"ltr\" style=\"line-height:2.4;text-indent: -36pt;margin-top:12pt;margin-bottom:12pt;padding:0pt 0pt 0pt 36pt\"><span style=\"font-size: 12pt;, serif;background-color: transparent;vertical-align: baseline\">\u00a0<\/span><\/p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration into the Social Sciences BLUF: Penetration testers, or more widely known as Ethical hackers, use all types of skills and resources to understand and react to the world of cybersecurity. Cybersecurity as a Whole Cybersecurity is heavily affected by other fields, and makes it an interdisciplinary field. It uses information from the other fields&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":30427,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/users\/30427"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/pages\/292\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eliwatkins-cyse201s\/wp-json\/wp\/v2\/media?parent=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}