{"id":334,"date":"2024-12-04T19:38:49","date_gmt":"2024-12-04T19:38:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/?page_id=334"},"modified":"2024-12-09T04:39:20","modified_gmt":"2024-12-09T04:39:20","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/career-paper\/","title":{"rendered":"career paper"},"content":{"rendered":"\n<p>Will Demarest<br>CYSE 201S \u2013 Cybersecurity and Social Science<br>Professor Yalpi<br>December 4, 2024<br>Penetration Tester<br>A penetration tester may be an outside consultant hired periodically by companies or<br>government agencies to test their systems for vulnerabilities. In a large corporation, they may be<br>a full-time employee and work as part of a red team. Either way, someone in this particular field<br>will depend on social science research and social science principles in their performance of their<br>day to day activities. As noted by the Cyber Security Education website, penetration testing<br>\u201c\u2026may involve using techniques such as social engineering, phishing, or network attacks\u201d. The<br>ethics of white hat social engineering have been debated requiring ethical neutrality when<br>deciding on whether to use such practices. Determinism, specifically regarding why individuals<br>may ignore their trainings and protocols or share their passwords, is another important principle<br>in this field as a penetration tester is often trying to exploit those behaviors.<br>The methods used by penetration testers can also be similar to the scientific process. A<br>penetration tester starts with a theory about which systems may be vulnerable. Then the tester<br>will develop a hypothesis about the types of vulnerabilities that are likely to exist. Basically, they<br>then design an experiment to test for these vulnerabilities. Finally, they have to report their<br>findings to management. This involves gathering empirical data (Empiricism). In presenting<br>findings to management, it is important to remember that the managers are not necessarily<br>technical experts. So, parsimony is an important principal as well.<br>In presenting findings and making recommendations to management, economic<br>principals will be important. In particular, a penetration tester should be able to describe the costs<br>and benefits of any recommendations. The Cyber Security Education website highlights the need<br>to, \u201cto demonstrate any potential losses in terms of lost work hours, recovery time, loss of<br>intellectual property, and other disruptions once you find a flawed system\u201d. These potential<br>losses should then be compared with the costs of additional software, training of employees,<br>hours spent by IT personnel installing patches, etc. Risk assessment is another important<br>economic principal. Management will likely want to know which assets are vulnerable if a cyber<br>attack is experienced and what the likelihood of such an attack would be.<br>This career relates to marginalized groups and society as a whole because one of the<br>assets that is often compromised in a cyber attack is customer data. Also, when a penetration<br>tester uses social engineering tactics as part of their work, the individuals targeted may be low<br>level employees. While managers are likely to know that penetration testing is taking place, the<br>low level employees might not. Falling for a penetration tester\u2019s scam could subject the<br>employee to disciplinary action or even being fired.<br>In conclusion, penetration testing is a career within the cybersecurity field that relies on<br>social science research and relates to social science principals. The daily routines of this<br>profession resemble the scientific process. This career can be of benefit to marginalized groups<br>by protecting their privacy. However, care should be taken to ensure that methods used do not<br>endanger low level employees who are more likely to be members of marginalized groups.<br>Works Cited<br>\u201cPenetration Testing: How to Become a Pen Tester (Duties &amp; Salary).\u201d Cyber Security<br>Education, 10 Apr. 2024, www.cybersecurityeducation.org\/careers\/penetration-tester\/.<br>Bhattacherjee, Anol. Social Science Research: Principles, Methods, and Practices. Anol<br>Bhattacherjee, 2012.<br>Joseph M. Hatfield, et al. \u201cVirtuous Human Hacking: The Ethics of Social Engineering in<br>Penetration-Testing.\u201d Computers &amp; Security, Elsevier Advanced Technology, 28 Feb. 2019,<br>www.sciencedirect.com\/science\/article\/abs\/pii\/S016740481831174X.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Will DemarestCYSE 201S \u2013 Cybersecurity and Social ScienceProfessor YalpiDecember 4, 2024Penetration TesterA penetration tester may be an outside consultant hired periodically by companies orgovernment agencies to test their systems for vulnerabilities. In a large corporation, they may bea full-time employee and work as part of a red team. Either way, someone in this particular fieldwill&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":29645,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/users\/29645"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/334\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/pages\/334\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/odu-portfoilio\/wp-json\/wp\/v2\/media?parent=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}