{"id":94,"date":"2024-12-09T01:25:57","date_gmt":"2024-12-09T01:25:57","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ekida002\/?page_id=94"},"modified":"2024-12-09T02:38:16","modified_gmt":"2024-12-09T02:38:16","slug":"cys201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/ekida002\/cys201s\/","title":{"rendered":"CYS201S"},"content":{"rendered":"\n<p>Article review #1- https:\/\/student.wp.odu.edu\/ekida002\/2024\/12\/09\/protecting-digital-rights-analyzing-jordans-legislative-efforts-and-internationalstandards\/    <\/p>\n\n\n\n<p>Article review #2-https:\/\/student.wp.odu.edu\/ekida002\/2024\/12\/09\/factors-influencing-the-formation-of-intellectual-security-among-university-students\/<\/p>\n\n\n\n<p>Career Paper- The Role of Ethical Hackers in Banking: A Social Science Perspective<\/p>\n\n\n\n<p>Introduction<br>Ethical hackers, sometimes known as penetration testers, are critical to securing the banking industry&#8217;s digital infrastructure. They employ their expertise to identify and patch vulnerabilities in financial systems before criminal hackers may exploit them. Beyond technological skills, this profession relies largely on social science approaches to handle human behavior, ethical quandaries, and societal consequences. This paper investigates how ethical hackers use social scientific research and concepts in their daily lives, with an emphasis on banking, and considers the broader consequences for marginalized groups and society.  <\/p>\n\n\n\n<p>How Social Science Helps Ethical Hackers<br>Ethical hackers have to grasp human behavior in order to predict and exploit typical<br>system flaws such as phishing schemes or improperly handled credentials. Social<br>science study, especially in psychology and sociology, helps them comprehend how<br>people interact with technology. Ethical hackers use social engineering techniques to<br>simulate real-world attacks, such as phishing emails or false login sites. They gain an<br>understanding of how people think and respond online by studying psychology, which<br>helps them create more realistic exams. They also assess whether security measures<br>are simple or difficult for users to utilize. If security tools are complicated, users may<br>ignore them, resulting in vulnerabilities<\/p>\n\n\n\n<p>Importance in the Banking Industry                                                                                                                            It is critical in the banking industry to protect financial systems and sensitive consumer<br>data. Ethical hackers use social science to improve communication and ensure security<br>measures are successful. For example, they assist banks in explaining security threats<br>to staff and customers in straightforward and culturally acceptable ways, thereby<br>increasing compliance with security policies. Banks also service a varied range of<br>customers, including underserved neighborhoods. Ethical hackers ensure that security<br>systems are fair and accessible to all, addressing issues such as language barriers and<br>ensuring that mobile banking apps operate for users with varied levels of technological<br>proficiency<\/p>\n\n\n\n<p>Impact on Society and Marginalized Groups<br>Ethical hackers&#8217; work has a huge social influence, particularly on marginalized<br>communities. Automated banking systems, for example, might occasionally incorrectly<br>designate some consumers as dangers due to algorithmic bias. Ethical hackers<br>evaluate these systems for biases and repair them, ensuring that all consumers are<br>treated fairly. Their work also contributes to the trust in financial institutions by securing<br>systems and safeguarding sensitive data. This trust is especially critical for groups that<br>may already feel excluded or neglected by institutions. Ethical hackers also support<br>extensive security measures that safeguard all users, regardless of social or economic<br>class.<\/p>\n\n\n\n<p>Class Concepts in Action<br>Several principles covered in class apply directly to the roles of ethical hackers. For example, they combat algorithmic bias by investigating and correcting flaws in systems such as fraud detection algorithms. They also preserve client privacy while maintaining ethical and legal standards. Furthermore, ethical hackers research social engineering approaches to better understand how attackers exploit human vulnerabilities, allowing them to create more effective defenses. These themes show how ethical hackers use technological expertise and social science understanding to solve challenging cybersecurity problems.<\/p>\n\n\n\n<p>Conclusion<br>Finally, ethical hackers in the banking industry use technological capabilities and social science principles to protect sensitive systems and data. They apply their knowledge of human behavior, communication, and ethics to identify vulnerabilities and create fair, accessible systems. Their work not only builds trust in banks, but it also protects society, particularly underprivileged people. This career emphasizes the need of combining technology and social science to handle today&#8217;s cybersecurity concerns.<\/p>\n\n\n\n<p>Journal Entries: https:\/\/student.wp.odu.edu\/ekida002\/category\/cyse201s\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article review #1- https:\/\/student.wp.odu.edu\/ekida002\/2024\/12\/09\/protecting-digital-rights-analyzing-jordans-legislative-efforts-and-internationalstandards\/ Article review #2-https:\/\/student.wp.odu.edu\/ekida002\/2024\/12\/09\/factors-influencing-the-formation-of-intellectual-security-among-university-students\/ Career Paper- The Role of Ethical Hackers in Banking: A Social Science Perspective IntroductionEthical hackers, sometimes known as penetration testers, are critical to securing the banking industry&#8217;s digital infrastructure. They employ their expertise&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/ekida002\/cys201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27314,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/pages\/94"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/users\/27314"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/comments?post=94"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/pages\/94\/revisions"}],"predecessor-version":[{"id":113,"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/pages\/94\/revisions\/113"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ekida002\/wp-json\/wp\/v2\/media?parent=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}