{"id":261,"date":"2023-11-26T09:32:13","date_gmt":"2023-11-26T09:32:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shanicedolson\/?p=261"},"modified":"2023-11-26T09:32:13","modified_gmt":"2023-11-26T09:32:13","slug":"my-career-paper-penetration-tester-cyse201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/shanicedolson\/2023\/11\/26\/my-career-paper-penetration-tester-cyse201s\/","title":{"rendered":"My Career Paper: Penetration Tester (CYSE201s)"},"content":{"rendered":"\n<p>Penetration testers are known as pen testers. Penetration testers are not Vulnerability testers. Even though both occupations look for weaknesses in a security program. A vulnerability tester looks for weaknesses during the design and setup. A penetration tester looks for weaknesses during an active system. Pen testers are similar to a white hat hacker. To compare the two, they are both ethical hackers or assurance validators. They hack for the improvement of a company&#8217;s security systems and networks. Penetration testers are divided into categories. The categories are web apps, mobile apps, testing networks, cloud, containers, embedded devices (IoT), mobile devices, application programming interface (API\u2019s), and continuous integration (CI)\/continuous deployment (CD) pipeline. With permission, a pen tester will start an assessment to try and hack into the company&#8217;s system\/network. If a pen tester is able to hack into the system\/network, they will create a detailed report on how they gained access. They will then conduct a meeting with the company to resolve the vulnerabilities they reported.&nbsp;<\/p>\n\n\n\n<p>Social science research is important to the occupation. The use of multiple research methods such as surveys, experiments, archival research, field studies, and multimethod research. It identifies what type of the information the hackers are targeting, which individuals were victim precipitation, and how commonly are the employees using \u201ceasily remembered\u201d passwords. A company can conduct their own surveys and submit the information to the penetration tester. Even if a company does not conduct their own survey, a pen tester will use their social engineering skills to collect as much information as possible. Some of the social engineering skills they will use are reconnaissance, scanning, gaining access, and maintaining access. This planning goes as far as dumpster diving for classified information that is not properly disposed.&nbsp;<\/p>\n\n\n\n<p>Social science principles that relate to this occupation are economics, psychology, and sociology. Thinking like a pen tester, what lacks in a small business may lack in a big business when it comes to security. If a hacker is struggling financially, they will target the big business for a ransom. In today\u2019s society, people tend to overshare on social media and find themselves getting hacked. Penetration tester&#8217;s still need social skills to gain personal information about a company from an employee. Gathering the simplest information from an employee will assist the pen tester in gaining access to the company&#8217;s database. Psychology also play a role in this because if an employee dislikes their job, they will exploit all the vulnerabilities without even knowing it.&nbsp;<\/p>\n\n\n\n<p>Knowing all this information about a penetration tester, they require cybersecurity skills. The skills required for cybersecurity are risk assessment, threat analysis, intrusion detection, programming (especially scripting) languages, and cloud security. Some of the basic skills required are strong verbal communication, problem solving, analytical thinking, report writing, and continuous learning.&nbsp;<br><\/p>\n\n\n\n<p>REFERENCES<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/#:~:text=Penetration%20testers%2C%20also%20known%20as,information%20technology%20(IT)%20teams\">https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/#:~:text=Penetration%20testers%2C%20 also%20 known%20as,information%20technology%20(IT)%20 teams<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.synopsys.com\/glossary\/what-is-penetration-testing.html\">https:\/\/www.synopsys.com\/glossary\/what-is-penetration-testing.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.threatintelligence.com\/blog\/social-engineering-penetration-testing\">https:\/\/www.threatintelligence.com\/blog\/social-engineering-penetration-testing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration testers are known as pen testers. Penetration testers are not Vulnerability testers. Even though both occupations look for weaknesses in a security program. A vulnerability tester looks for weaknesses during the design and setup. A penetration tester looks for&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/shanicedolson\/2023\/11\/26\/my-career-paper-penetration-tester-cyse201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26289,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/261"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/users\/26289"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/comments?post=261"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/261\/revisions"}],"predecessor-version":[{"id":262,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/261\/revisions\/262"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/media?parent=261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/categories?post=261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/tags?post=261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}