{"id":303,"date":"2022-05-06T09:28:55","date_gmt":"2022-05-06T09:28:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/terranceboakye\/?p=303"},"modified":"2022-05-06T09:28:56","modified_gmt":"2022-05-06T09:28:56","slug":"career-professional-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/terranceboakye\/2022\/05\/06\/career-professional-paper\/","title":{"rendered":"Career Professional Paper"},"content":{"rendered":"\n<p><strong>Pen Tester<\/strong><\/p>\n\n\n\n<p>  In many businesses and corporations, There are hackers that are trying to steal<br>Information and personal data. People like these are called black hat hackers. Since we have<br>hackers like these, this is where pen testers come into the picture. Pen testers&#8217; roles are to use<br>various tools for the specific use of exploiting a computer system, websites and many other<br>things to help find a business vulnerability. Another name that pen testers go by are usually white<br>hat hackers.<\/p>\n\n\n\n<p>  As you can see pen testers are very urgent in the cybersecurity world and many<br>companies use these people to help advance the security systems. Pen testers can simulate a<br>cyberattack so they can test the security workers that work in the business to tell them the<br>vulnerabilities and what they need to fix. Pen testers try to find ways to hack business corporations<br>by looking for ways to exploit vulnerabilities in networks, web apps, and security in order to<br>penetrate an organization&#8217;s cyber defenses just so the black hat hackers can not do it first.<\/p>\n\n\n\n<p>  Pen testers have a plethora of strategies that they use to perform these attacks on<br>companies. Starting with the first one we have external testing which involves attacks on the<br>network perimeter of an organization utilizing methods carried out from outside the<br>organization\u2019s systems such as the Extranet and the internet. Another strategy that pen testers<br>use is targeting testing. Both IT and penetration testing teams are involved in target testing.<br>Going in, testing efforts and information about the goal and network design are known. Targeted<br>tests take less time and effort than blind tests, but they might not always provide the same<br>complete overview of an organization&#8217;s security vulnerabilities and response capabilities as other<br>testing methods. Pen testing can also be done automatically by a computer. Pen testing utilizing<br>automated testing technologies saves time and money by automating parts of the pen testing<br>process allowing for continuous vulnerability detection without the need for human interaction.<\/p>\n\n\n\n<p>  To wrap everything up, pen testers are very important in the cybersecurity field and they<br>play a big role in helping strengthen businesses and other companies&#8217; data and as more<br>businesses and jobs arise we are in need of more pen testers to help protect these companies.<\/p>\n\n\n\n<p>Source cited<strong>: Security, C. (n.d.). What is penetration testing: Definition methods. What Is<br><\/strong>Penetration Testing | Definition Methods. Retrieved May 5, 2022, from<br>https:\/\/www.contrastsecurity.com\/knowledge-hub\/glossary\/penetration-testing<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pen Tester In many businesses and corporations, There are hackers that are trying to stealInformation and personal data. People like these are called black hat hackers. Since we havehackers like these, this is where pen testers come into the picture. Pen testers&#8217; roles are to usevarious tools for the specific use of exploiting a computer&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/terranceboakye\/2022\/05\/06\/career-professional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":21984,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/303"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/users\/21984"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/303\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/303\/revisions\/304"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/media?parent=303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/categories?post=303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/tags?post=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}