{"id":366,"date":"2023-12-04T04:30:18","date_gmt":"2023-12-04T04:30:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/?p=366"},"modified":"2023-12-04T04:30:18","modified_gmt":"2023-12-04T04:30:18","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/2023\/12\/04\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Let us start by defining this career. What is the difference between Ethical Hacking and<br>Penetration Testing? They are the same but not the same. \u201cPen testing focuses on identifying<br>risks. Ethical hacking concentrates on identifying risk and showing and demonstrating the<br>exploitation\u201d (Singh, 2023). \u201cThey have their place in cybersecurity and identifying security<br>threats and vulnerabilities\u201d (Singh, 2023). Let us take further the word Ethical Hacker. \u201cEthical<br>means they have a conscience and get approval from the organization for the hacking. In<br>contrast, the word hacker means that a person does it from behind someone and does the<br>penetration illegally\u201d (Singh, 2023).<br>To start, we need to see how these professions deal with the social sciences and<br>use this to research. Let us see what the principles of social science are. These principles are<br>\u201cAnthropology \u2013 knowing about the emergence of humans, where we came from, how we<br>developed physically, and why. Criminology &#8211; the study of crime, criminals, and society&#8217;s<br>response to them. Economics &#8211; the study of how societies use their limited resources to produce<br>wealth and how the distribution of the wealth among their members is determined. Geography &#8211;<br>the study of places and the relationship between people and their environments. Political Science<br>\u2013 the study of politics, political decision-making, and connections to human affairs. Psychology &#8211;<br>the science of understanding human behavior. Furthermore, lastly, there is Sociology \u2013 the study<br>of social life, social behavior, and social institutions\u201d (Liberto, 2023).<br>So, cybersecurity is the focus of threats through the computer or any other device<br>that any human uses. Compared to back then, it is a part of our daily lives. Cybersecurity is a<br>subdivision of computer science. We will take it further and talk about the social aspect of<br>ethical hackers. A social aspect of hacking is knowing who the target is. \u201cSocial hacking does this by essentially lying and manipulating\u2014an ethical hacker who knows socially how to<br>accomplish this by doing much less work\u201d (Poston, 2019). The job is to see the target when<br>preparing for and performing a social engineering attack. Research is always done in advance to<br>accomplish the attack. \u201cDuring an ethical hacking engagement, social engineering is out of<br>scope. Hacking involves lying to the mark and can damage the relationship between the<br>employees of a company and its management. It is especially true if the engagement is<br>performed poorly and employees feel that the company is trying to trick them into bad behavior\u201d<br>(Poston, 2019).<br>\u201cSocial engineering exercises are vital to ethical hacking engagements\u201d (Poston, 2019).<br>Over 99% of cyberattacks require human interaction because, in most cases, it is much easier to<br>trick a person than to cheat a computer\u201d (Poston, 2019). \u201cEthical hackers must help their<br>customers learn to identify and respond appropriately to social engineering attempts\u201d (Poston,<br>2019). \u201cEthical hackers use their hacking skills for good and often work with businesses and<br>organizations to help them improve their cybersecurity\u201d (Simplilearn, 2023). Ethical hackers and<br>Penetration testers want to make the world a safer place in this cyber world.<br>In conclusion, technology and information have drastically increased and will only<br>increase with time. The world we live in socially. We want quick results; the only way to get<br>them is through different media sources. There might be a lack of awareness, and the probability<br>of falling victim to all cybercrime will inevitably increase. Cyber attacks happen more often<br>now. We can dwindle the attacks with the help of professional Ethical Hackers or Penetration<br>testers.<\/p>\n\n\n\n<p>References<br>Liberto, D. (2023, November 1). Social Science: What It Is and the 5 Major Branches.<br>Investopedia. Retrieved December 3, 2023, from<br>https:\/\/www.investopedia.com\/terms\/s\/social-science.asp<br>Poston, H. (2019, October 22). Ethical hacking: Social engineering basics | Infosec.<br>Infosec Resources. Retrieved December 3, 2023, from<br>https:\/\/resources.infosecinstitute.com\/topics\/hacking\/ethical-hacking-social-engineering-<br>basics\/<br>Simplilearn. (2023, October 25). What Ethical Hacking Skills Do Professionals Need?<br>Simplilearn.com. Retrieved December 3, 2023, from https:\/\/www.simplilearn.com\/roles-<br>of-ethical-hacker-article<br>Singh, R. (2023, November 17). Ethical Hacking vs Penetration Testing. Indusface.<br>Retrieved December 3, 2023, from https:\/\/www.indusface.com\/blog\/how-penetration-<br>testing-is-different-from-ethical-hacking\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let us start by defining this career. What is the difference between Ethical Hacking andPenetration Testing? They are the same but not the same. \u201cPen testing focuses on identifyingrisks. Ethical hacking concentrates on identifying risk and showing and demonstrating theexploitation\u201d (Singh, 2023). \u201cThey have their place in cybersecurity and identifying securitythreats and vulnerabilities\u201d (Singh, 2023)&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mikaelsykes\/2023\/12\/04\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":24848,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts\/366"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/users\/24848"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts\/366\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts\/366\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/media?parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/categories?post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/tags?post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}