{"id":77,"date":"2024-04-18T22:27:17","date_gmt":"2024-04-18T22:27:17","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cbass007\/?p=77"},"modified":"2024-04-18T22:27:17","modified_gmt":"2024-04-18T22:27:17","slug":"career-professional-paper","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/cbass007\/2024\/04\/18\/career-professional-paper\/","title":{"rendered":"Career Professional Paper"},"content":{"rendered":"\n<p>Cybersecurity Career: Penetration Tester<\/p>\n\n\n\n<p><br>Cayden Bass-Hensley<br><\/p>\n\n\n\n<p>Cybersecurity and the Social Sciences, 201S<br><\/p>\n\n\n\n<p>Diwakar Yalpi<br><\/p>\n\n\n\n<p>4\/7\/2024<br><\/p>\n\n\n\n<p>The work of the penetration tester is crucial in the audit of the organization&#8217;s safety, and<br>he emulates the attack on cyberspace and exposes the vulnerabilities. Even though their work<br>seems mostly technical, penetration testers also run on many social science principles, especially<br>in Psychology, Social Engineering, and Risk Communication. This paper aims to point out how<br>various social science notions influence the normal functioning of penetration testers and<br>how their work relates to marginalized groups and society in general.<br><\/p>\n\n\n\n<p>Social engineering is an important element of the penetration testing process as<br>well. It is that sequence of events in which the hacker makes the best use of human weaknesses<br>and desires, in order to acquire unauthorized access to the system or to reveal sensitive data<br>(Hatfield, 2019). Additionally, the testers should have tech knowledge along with in-depth<br>understanding in the area of social science research which includes psychology, influence, and<br>persuasion. The art of integrating theories from the field to provide a pathway on how to affect<br>human mindsets, thoughts, and the organization&#8217;s security plan would be a channel for pointing<br>out the weaknesses in the organization&#8217;s security system. For instance, testers can utilize the<br>methods of pretexting, phishing and impersonation, which are related to psychology\u2019s authority<br>bias, reciprocity and social proof.<br><\/p>\n\n\n\n<p>Communication is the other key to the penetration tester\u2019s role as well (Gear &amp;<br>Harthorne, 2002). Social science principles such as risk communication, stakeholder<br>management and report writing are crucial in translating the findings and recommendations of<br>penetration tests into a comprehensive report. Testers must communicate complex technical<br>information in a clear and concise manner, tailored to the needs and understanding of diverse<br>stakeholders, including executives, IT personnel, and security teams. Through using<br>communication theories and best practices, penetration testers can be sure that the stakeholders<br>understand these findings and that remediation measures are implemented in a reasonable and<br>speedy manner.<br><\/p>\n\n\n\n<p>On top of this, penetration testers have to look at the broader societal implications of their<br>actions, especially when they relate to the marginalized. Social science researchers on digital<br>privacy, online harassment, and cybercrime may employ strategies that are related to, the<br>vulnerabilities and risk vulnerabilities the communities face (Third et al, 2014). Through<br>understanding the particular challenges and threats to which marginalized groups are<br>exposed, penetration testers will be able to create targeted testing locations and recommendations to<br>help the organizations protect such vulnerable populations from the digital world and promote<br>digital equality.<br><\/p>\n\n\n\n<p>Moreover, social science research in the field of culture, ethical and legal frameworks<br>that are integral to penetrability tests are very essential. Penetration testers need not only to know<br>well all the aspects of organizational duties, stakeholders&#8217; assumptions, and law and regulation<br>but also they need the interconnection of all these together. As a result, the penetration testers can<br>use principles from fields such as organizational psychology, business ethics, and legal studies to<br>design methods that would help ensure that their actions remain in the spectrum of ethics and the<br>law, as well as create an environment of collaboration which is necessary for sustainable<br>continuous improvement in cybersecurity practices.<br><\/p>\n\n\n\n<p>In conclusion, penetration testers heavily rely on social science research and principles to<br>effectively assess and mitigate cyber risks. Through employment of knowledge from disciplines<br>such as psychology, communication studies, and organizational behavior, penetration testers will<br>be able to master social engineering techniques, convey their findings in a clear and convincing<br>way, accommodate the interests of the groups at the margins, and handle the nuances around<br>ethics and law. Their endeavors strengthen the organization&#8217;s overall cybersecurity posture and<br>eventually improve a more secure digital environment for the entire society.<br><br>Reference<br>Geer, D., &amp; Harthorne, J. (2002, December). Penetration testing: A duet. In 18th Annual<br>Computer Security Applications Conference, 2002. Proceedings. (pp. 185\u2013195). IEEE.<br>Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in<br>penetration-testing. Computers &amp; Security, 83, 354\u2013366.<br>Third, A., Forrest-Lawrence, P., &amp; Collier, A. (2014). Addressing the cyber safety challenge:<br>From risk to resilience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Career: Penetration Tester Cayden Bass-Hensley Cybersecurity and the Social Sciences, 201S Diwakar Yalpi 4\/7\/2024 The work of the penetration tester is crucial in the audit of the organization&#8217;s safety, andhe emulates the attack on cyberspace and exposes the vulnerabilities. Even though their workseems mostly technical, penetration testers also run on many social science principles,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/cbass007\/2024\/04\/18\/career-professional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28373,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/posts\/77"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/users\/28373"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"predecessor-version":[{"id":79,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/posts\/77\/revisions\/79"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cbass007\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}