{"id":353,"date":"2024-04-22T18:20:54","date_gmt":"2024-04-22T18:20:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shadowyseth\/?page_id=353"},"modified":"2024-04-22T18:31:45","modified_gmt":"2024-04-22T18:31:45","slug":"career-professional-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shadowyseth\/career-professional-paper\/","title":{"rendered":"Career professional paper"},"content":{"rendered":"\n<p>The roles when it comes to a Penetration<br>Tester<br>With the rapidly evolving landscape of the cybersecurity field there the professions that can<br>help. One of them is the penetration testers they play a role when it comes to safeguarding when it<br>comes to digital infrastructures if there a malicious attacks. This job is a crucial role when it comes to the<br>cybersecurity field. I will be talking about this job when it comes to the social sciences, their key<br>concepts, and how they address issues.<br>First, we will talk about how to understand human behavior when it comes to penetration<br>testing. When it comes to penetration testers they will mainly utilize social engineering techniques how<br>they do this they will exploit human vulnerabilities mainly and try not to focus on technical<br>vulnerabilities but they do use this too. When it comes to the study of social science penetration testers<br>they will try to manipulate individuals when they need to divulge when it comes to sensitive information<br>or perform an action that can compromise security. They do this so they can understand human<br>behavior when it comes to working with them if they have to do their testing. When they have to deal<br>with attacks or create them for testing they have to understand human behavior when doing it.<br>Second, The penetration testers will start to navigate the Ethical considerations and societal<br>implications when it comes to societal implications when it comes to their actions. They will start to<br>understand the social science principles like ethics, privacy, and socio-economic when it comes to cyber<br>threats. For example, penetration testers have to follow ethical guidelines and legal frameworks when it<br>comes to their activities this way they don\u2019t infringe on people&#8217;s rights or cause harm. They try to<br>consider the ethical and social when it comes to understanding them when they work because of this it<br>allows them to do their testing when it comes to the impact of the cyber threats. <\/p>\n\n\n\n<p>Third, I will be talking about human-security solutions when it comes to penetration testers.<br>They develop human-centric security solutions when it comes to human behaviors and preferences<br>when it comes to their job. When it comes to this they will make sure they don\u2019t cause something that<br>will cause rigid security measures that can impede the product They do this so they can have an insight<br>when it comes to the behavioral economics when human-computer interaction. It is so they can<br>understand it. With this, they then can do friendly security protocols that can help with this problem<br>when it comes to the guidelines when it comes to working. They take into account when it comes to the<br>work because they know that it will have biases, decision-making processes, and user experience when<br>they are working on implementing effective security when it comes to the diverse user groups. Doing<br>this will not only enhance the overall security posture but it will also foster the culture of security<br>awareness. This will allow the organizations to have compliance and culture security.<br>In conclusion, this is the research when it comes to the penetration testers and their<br>understanding of the social sciences and principles when it comes to the test. I find this interesting when<br>it comes to this job and it is the reason I do want to go for this job later in the future. They have to<br>understand human behavior, design human-centric security solutions, and ethical considerations when it<br>comes to their job since they have to create a safeguard in the digital infrastructures so that people can<br>be safe. They will do many tests and create tests for others to understand and how to stop it. By doing<br>this they are helping create patches or updates that can help protect people when it comes to the digital<br>future.<\/p>\n\n\n\n<p>Work Cite<br>The art of deception. (n.d.-b). https:\/\/repo.zenk-security.com\/Magazine%20E-<br>book\/Kevin_Mitnick_-_The_Art_of_Deception.pdf<br>Security and usability by Lorrie Faith Cranor, Simson Garfinkel. (n.d.-a).<br>http:\/\/ommolketab.ir\/aaf-lib\/fcz6ikrzzyku9yysc47nzx6q92ajt7.pdf<br>Anderson, R. (2022a, April 29). The Economics of Information Security. Science.<br>https:\/\/www.academia.edu\/78010319\/The_Economics_of_Information_Security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The roles when it comes to a PenetrationTesterWith the rapidly evolving landscape of the cybersecurity field there the professions that canhelp. One of them is the penetration testers they play a role when it comes to safeguarding when itcomes to digital infrastructures if there a malicious attacks. This job is a crucial role when it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shadowyseth\/career-professional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28348,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/353"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/users\/28348"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/comments?post=353"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/353\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/353\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/media?parent=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}