{"id":355,"date":"2024-12-10T16:01:00","date_gmt":"2024-12-10T16:01:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/matthewrozean\/?page_id=355"},"modified":"2024-12-11T00:50:28","modified_gmt":"2024-12-11T00:50:28","slug":"essays","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/matthewrozean\/essays\/","title":{"rendered":"Career Professional Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br><strong>Ethical Hacking<\/strong><\/p>\n\n\n\n<p><strong>Introduction<br><\/strong>My journey into the Cyber world all began when I decided to watch the TV show Mr.<br>Robot. The show shows both sides of the hacking world, the side when Elliot (the main<br>character) defends his company from cyber threats and the side when Elliot is hacking a<br>corporation to expose their ill deeds. This show piqued my interest into hacking as I found it so<br>cool and such a powerful tool to that nowadays is necessary to have as a defense for corporations<br>for them to protect their assets and data. Ethical hacking is now becoming a way more beneficial<br>tool for industries to have in their defenses. It can show the weaknesses of your network and help<br>patch the weaknesses before a threat exposes those weaknesses and leads to data loss and<br>worker\u2019s vital information or vital business information leaked to the public. With all of this in<br>mind Ethical hacking has many ethical as well as social influences on today\u2019s industries that I<br>would like to bring to your attention.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Social Influences<br><\/strong>In an article \u201cWhy do young people start and continue with ethical hacking? A qualitative<br>study on individual and social aspects in the lives of ethical hackers\u201d the authors Noordegraaf<br>and Kranenbarg discuss what motivates people to begin their journey in ethical hacking as well<br>as continuing down that path. Social influences like role models, close friends, and positive<br>views from the industries themselves. Just like I was influenced by a TV show many others are<br>influenced by the things that socially surround us and trigger a desire to become that very thing<br>we have been influenced by. Noordegraaf and Kranenbarg\u2019s study mentions the theory of the<br>Social Learning theory which is a behavior that is learned through witnessing and imitating<br>others (just like me wanting to be like Elliot from Mr. Robot).<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Ethical Conduct<br><\/strong>Pierce, Jones, &amp; Warren\u2019s article \u201cPenetration testing professional ethics: A conceptual<br>model and taxonomy\u201d really dive deep into the ethical conduct when it comes to the hacking as a<br>career and the importance of having ethical conduct. They emphasize that hackers need to keep a<br>professional attitude and maintain ethical guidelines as they will be held accountable for their<br>actions on the job. Then in another article written by Thomas, Burmeister and Low they highly<br>emphasize the importance of ethical behavior and the prevention of the misuse of personal<br>information as well as harp on protection of privacy. Hackers have a very powerful position in<br>today\u2019s world with the ability to find information about anybody they set their minds to. Ethical<br>Hackers must maintain a high vigilance when it comes to obeying laws and regulations when it<br>comes to misuse of information and privacy rights.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Social Structures<br><\/strong>Cybersecurity in general is a huge social structure. In the cyber world the collaboration<br>and sharing of information is vital and a key to success. For everyone to fight against all the<br>threats in this world, it becomes a whole lot easier when industries or individuals get<br>vulnerabilities, cyber attacks and any information of that sort out for the public to see. This<br>generates collaboration and a community able to work together to protect vital information and<br>help be equipped to fight off attacks that they themselves have not been exposed to yet or to not<br>let a vulnerability slip through the cracks again of the same type. This creation of a social<br>network shows how marginalized groups are working together to effectively mitigate and defend<br>against as many threats as possible to maintain data privacy and security.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Conclusion<br><\/strong>What a person is exposed to in life and what they surround themselves with is a type of<br>social learning theory that influences individual\u2019s choices in life and possibly affect their career<br>and personal experience choices they make in life. Being an ethical hacker will take integrity and<br>self-discipline to not use the skills learned for personal gain and or criminal behavior that breaks<br>laws. With the ever-evolving world of technology the community grows and grows to continue<br>helping each other fight off vulnerabilities, attacks and malware. Without social networking the<br>cyber world would be a whole lot different and a lot less secure in my opinion, the more<br>knowledge passed around the more equipped industries can be at defending their assets to attacks<br>they may have never seen yet but in time will make it to their networks.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Reference Page<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Mirjalili, M., Nowroozi, A., &amp; Alidoosti, M. (2014). A survey on web penetration test. Advances<br>      in Computer Science: an International Journal, 3(6), 107-121.<br>Noordegraaf, J. E., &amp; Weulen Kranenbarg, M. (2023). Why do young people start and continue<br>      with ethical hacking? A qualitative study on individual and social aspects in the lives of<br>      ethical hackers. Criminology &amp; Public Policy, 22(4), 803-824.<br>Pierce, J., Jones, A., &amp; Warren, M. (2006). Penetration Testing Professional Ethics: a conceptual<br>      model and taxonomy. Australasian Journal of Information Systems, 13(2).<br>Thomas, G., Burmeister, O., &amp; Low, G. (2019). The Importance of Ethical Conduct by<br>      Penetration Testers in the Age of Breach Disclosure Laws. Australasian Journal of<br>      Information Systems, 23<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/matthewrozean\/article-review-1\/\">Article Review #1<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/matthewrozean\/article-review-2\/\">Article Review #2<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking IntroductionMy journey into the Cyber world all began when I decided to watch the TV show Mr.Robot. The show shows both sides of the hacking world, the side when Elliot (the maincharacter) defends his company from cyber threats and the side when Elliot is hacking acorporation to expose their ill deeds. This show [&hellip;]<\/p>\n","protected":false},"author":27541,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages\/355"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/users\/27541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages\/355\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/pages\/355\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/matthewrozean\/wp-json\/wp\/v2\/media?parent=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}