{"id":35,"date":"2024-12-12T22:39:22","date_gmt":"2024-12-12T22:39:22","guid":{"rendered":"https:\/\/student.wp.odu.edu\/dpope005\/?p=35"},"modified":"2024-12-12T22:39:22","modified_gmt":"2024-12-12T22:39:22","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/dpope005\/2024\/12\/12\/career-paper\/","title":{"rendered":"Career Paper !"},"content":{"rendered":"\n<p>[Daryl Pope]<br>[Diwakar Yalpi]<br>[CYSE 201S]<br>[11\/24\/2024]<\/p>\n\n\n\n<p><br><strong>Career Paper<\/strong><\/p>\n\n\n\n<p><br>Throughout the world of cyber security, there are countless amounts of different procedures and<br>pathways that cyber professionals can pursue. Almost to the point where there seems to be no<br>limit to the different careers that they can choose. Today, I have taken the time to research the<br>most important careers in the field of cyber security and critically analyze them to gain more<br>understanding. While I was researching these different careers I came across jobs such as<br>malware analysts, security engineers, and many more. But the one that I found to be the most<br>interesting and important was the career of a penetration tester.<\/p>\n\n\n\n<p><br><strong>What is a Penetration Tester?<\/strong><\/p>\n\n\n\n<p><br>So, what actually is a Penetration Tester? To keep it as simple as possible, penetration testers are<br>cyber security professionals that simulate cyberattacks on their own companies networks and<br>systems in order to identify and fix security vulnerabilities. In a way, a penetration tester could<br>be classified as a \u201chacker\u201d, but they are doing it for the benefit of their own company. This<br>procedure is what you would call \u201cethical hacking\u201d. A method used nowadays by any company<br>that you could think of.<\/p>\n\n\n\n<p><br><strong>What are the Methods of a Penetration Tester?<\/strong><\/p>\n\n\n\n<p><br>With something as complicated as computer software you would think you will need someone<br>experienced enough to take on the job. And in that right, you would be correct, but the methods<br>of penetration testers aren\u2019t so easy to obtain. While researching penetration testers, I found that<br>there are different courses that they can take in order to learn the methods of pen testing or<br>\u201cethical hacking\u201d. A source that I found on the official page of the University of Tulsa explained<br>a different method that pentesters find their way into the field. They said \u201cTo become a<br>penetration tester , a bachelor\u2019s degree in cybersecurity or a related field is recommended<br>because it provides foundational tech skills.\u201d (University of Tulsa). An advanced degree in<br>cybersecurity would definitely make sense to obtain for a job to the scale of a pen tester. I have<br>been talking a lot about pentesting broadly, but there are specifics when it comes to the type of<br>pentesting. In an article I found through Ironhack.com, they explain that \u201cPentesting is split into<br>three main types of tests. These are referred to as white box, black box, and gray box. These<br>three methods examine various potential scenarios that a criminal hacker may be in, depending<br>on how much they know about a company&#8217;s computer network\u201d (Ironhack). All of these different<br>types of pentests are learned through labs by aspiring pentesters before they become certified.<\/p>\n\n\n\n<p><br><strong>Why are Pentesters So Important?<\/strong><\/p>\n\n\n\n<p><br>Pentesters are extremely important to the security of companies for many different reasons.<br>Having pentesters on your team conducting research, by itself, adds an extra layer of security to<br>your company. Having someone that understands how your company\u2019s security works, providing<br>regular tests allows for your company to highlight mistakes and patch needed holes within the<br>systems. Investing in regular penetration testing can also save organizations money in the long<br>run. This is by preventing costly data breaches, system downtime, or financial penalties that can<br>all happen if hackers are able to infiltrate.<\/p>\n\n\n\n<p><br><strong>How does Pentesting Affect Marginalized Groups?<\/strong><\/p>\n\n\n\n<p><br>Penetration testing can be important for marginalized groups by ensuring their digital spaces are<br>secure from exploitation and harm. These marginalized groups can include people who may not<br>be as familiar or comfortable with technology, especially those who lack access to digital<br>education or resources. Pentesters are able to create a barrier between unethical hackers and the<br>marginalized to keep them safe from different cyber attacks.<\/p>\n\n\n\n<p><br><strong>How does Pentesting Apply Social Sciences?<\/strong><\/p>\n\n\n\n<p><br>In class we have discussed different social sciences before, and how they apply to cyber security.<br>And in this case, I believe that cyber security applies to social sciences in a unique way. In class<br>we talked about Maslow\u2019s hierarchy of needs and how each different level corresponds to a<br>different need. Penetration testing contributes to Maslow&#8217;s hierarchy of needs, particularly in the<br>&#8220;safety&#8221; and &#8220;belonging&#8221; levels. This is by securing digital spaces and protecting personal<br>information, pentesting ensures individuals&#8217; safety in online environments. Without someone to<br>test social media outlets for mistakes, there could be a data breach and everyone using the social<br>media with their personal information on there would become viable for their information to be<br>stolen.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><br>To conclude, penetration testers are one of the most valuable, yet challenging career paths within<br>the field of cybersecurity. Pentesters maintain balance and structure within the integrity of the<br>system&#8217;s security.<\/p>\n\n\n\n<p><br><strong>Sources<\/strong><\/p>\n\n\n\n<p><br>Ironhack. &#8220;What Is Penetration Testing and How to Get Started.&#8221; Ironhack, 23 Nov. 2023,<br>www.ironhack.com\/us\/blog\/what-is-it-and-how-to-get-started-in-pentesting.<\/p>\n\n\n\n<p><br>University of Tulsa. &#8220;Benefits of Penetration Testing.&#8221; University of Tulsa Online,<br>www.online.utulsa.edu\/blog\/benefits-of-penetration-testing\/.<\/p>\n\n\n\n<p><br>Kaplan-Moss, Jacob. &#8220;The Ethics of Social Engineering Tests.&#8221; Jacobian.org, 27 June 2017,<br>https:\/\/jacobian.org\/2017\/jun\/27\/social-engineering-pentests\/. Accessed 24 Nov. 2024.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Daryl Pope][Diwakar Yalpi][CYSE 201S][11\/24\/2024] Career Paper Throughout the world of cyber security, there are countless amounts of different procedures andpathways that cyber professionals can pursue. Almost to the point where there seems to be nolimit to the different careers that&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/dpope005\/2024\/12\/12\/career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29592,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts\/35"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/users\/29592"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":37,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/posts\/35\/revisions\/37"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/dpope005\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}