{"id":341,"date":"2024-12-09T02:55:22","date_gmt":"2024-12-09T02:55:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholascarter\/?page_id=341"},"modified":"2024-12-09T02:55:22","modified_gmt":"2024-12-09T02:55:22","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nicholascarter\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><strong>Ethical Hacker Career Paper<\/strong><\/p>\n\n\n\n<p>Ethical hacking is a practice where you use techniques that a hacker would use and try to find vulnerabilities within a company\u2019s computer system to help fix the vulnerabilities that may cause problems in the future. (Coursera, n.d.) This job has become a very popular and important aspect of cybersecurity. To properly be able to do the job of an ethical hacker the employee needs to exercise social science concepts and research such as social engineering, skepticism, and objectivity. While also being capable of not only conducting their own experiments but using archival research to assess past experiments and data.<\/p>\n\n\n\n<p><strong>Social Engineering<\/strong><\/p>\n\n\n\n<p>Social engineering is the manipulation or influence of individuals to gain unauthorized access to systems or sensitive information. (Carnegie Mellon University, n.d.) It is one of the most critical tools in an ethical hacker&#8217;s arsenal. By simulating real-world attacks using social engineering tactics, ethical hackers can identify security weaknesses that are particularly prone to human error. For example, they might use phishing techniques to test whether employees can recognize deceptive emails. These exercises provide insight, not only exposing potential vulnerabilities but also offering employees real world training on how to recognize and counteract social engineering attempts.<\/p>\n\n\n\n<p><strong>Skepticism<\/strong><\/p>\n\n\n\n<p>An ethical hacker must approach their work with skepticism, continuously questioning the security measures in place. Even when a company\u2019s defenses appear robust, a hacker\u2019s job is to identify overlooked vulnerabilities. Skepticism drives ethical hackers to explore unconventional attack methods and verify the effectiveness of all security protocols. This mindset ensures a thorough evaluation and reduces the risk of complacency, which can be disastrous in the ever-evolving landscape of cyber threats.<\/p>\n\n\n\n<p><strong>Objectivity<\/strong><\/p>\n\n\n\n<p>Objectivity is essential for ethical hackers, requiring them to remain impartial and avoid biases that could cloud their judgment. Objectivity in science is not letting value judgements or personal interests influence results.(Zalta, n.d.) Being objective ensures that the hacker&#8217;s findings and recommendations are honest and unbiased. A failure to maintain objectivity, for example, falsifying reports or intentionally omitting security flaws could result in disastrous consequences for the organization. Ethical hackers must adhere to strict professional ethics, ensuring that their assessments are both accurate and actionable, regardless of their personal views or experiences with the company.<\/p>\n\n\n\n<p><strong>Marginalization in Ethical Hacking<\/strong><\/p>\n\n\n\n<p>Ethical hacking and cybersecurity as a whole have long been dominated by white and Asian men, who comprise 94% of the workforce. (Fulton et al., 2023) This lack of diversity has significant implications for marginalized groups, many of whom feel underrepresented and unwelcome in the field. Such feelings of exclusion deter talented individuals from pursuing cybersecurity careers.<\/p>\n\n\n\n<p>Studies suggest that marginalized groups often face additional barriers, such as limited access to technical training and mentorship opportunities. Furthermore, the industry&#8217;s focus on technical backgrounds can discourage those without prior knowledge from entering the field. Addressing these systemic issues is crucial for fostering diversity in ethical hacking, as diverse perspectives can lead to more comprehensive security solutions.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Ethical hacking is a profession deeply rooted in social sciences, combining technical expertise with an understanding of human behavior. To succeed, ethical hackers must excel in social engineering, skepticism, and objectivity, which are skills that allow them to identify and address vulnerabilities effectively. However, the profession also faces challenges in terms of diversity and inclusivity. Addressing these issues will not only create a more equitable workforce but also enhance the overall effectiveness of cybersecurity initiatives. Ethical hacking\u2019s importance in safeguarding companies continues to grow, making it a critical field within the cybersecurity landscape.<\/p>\n\n\n\n<p><strong>Citations:<\/strong><\/p>\n\n\n\n<p><strong>Zalta, E. N. (Ed.). (n.d.). <em>Scientific objectivity<\/em>. In <em>The Stanford Encyclopedia of Philosophy<\/em> (Fall 2023 Edition). Stanford University. Retrieved November 20, 2024, from <\/strong><a href=\"https:\/\/plato.stanford.edu\/entries\/scientific-objectivity\/\"><strong>https:\/\/plato.stanford.edu\/entries\/scientific-objectivity\/<\/strong><\/a><\/p>\n\n\n\n<p><strong>Carnegie Mellon University. (n.d.). <em>Social engineering: Don\u2019t take the bait<\/em>. Information Security Office. Retrieved November 20, 2024, from <\/strong><a href=\"https:\/\/www.cmu.edu\/iso\/aware\/dont-take-the-bait\/social-engineering.html\"><strong>https:\/\/www.cmu.edu\/iso\/aware\/dont-take-the-bait\/social-engineering.html<\/strong><\/a><\/p>\n\n\n\n<p><strong>Fulton, K. R., et al. (2023). Vulnerability discovery for all: Experiences of marginalization in vulnerability discovery. <em>2023 IEEE Symposium on Security and Privacy (SP)<\/em>, 1997\u20132014. <\/strong><a href=\"https:\/\/doi.org\/10.1109\/SP46215.2023.10179478\"><strong>https:\/\/doi.org\/10.1109\/SP46215.2023.10179478<\/strong><\/a><\/p>\n\n\n\n<p><strong>Coursera. (n.d.). <em>What is ethical hacking?<\/em> Retrieved November 20, 2024, from <\/strong><a href=\"https:\/\/www.coursera.org\/articles\/what-is-ethical-hacking\"><strong>https:\/\/www.coursera.org\/articles\/what-is-ethical-hacking<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacker Career Paper Ethical hacking is a practice where you use techniques that a hacker would use and try to find vulnerabilities within a company\u2019s computer system to help fix the vulnerabilities that may cause problems in the future. (Coursera, n.d.) This job has become a very popular and important aspect of cybersecurity. To&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholascarter\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":29694,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/341"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/users\/29694"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/341\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/341\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/media?parent=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}