Introduction
When identifying the cyber career penetration tester or ethical hacking, one can do so when fixing such vulnerabilities. Ethical hacking plays a crucial role in safeguarding digital infrastructures. This career can be seen as such a technological career. However, this career does gravitate upon different social science concepts such as, descion-making, human behavior, different organizational dynamics, and many more. More in-depth, being a penetration tester, one would have to take account on how individuals manage their technology and make a judgement security wise. Being a penetration tester correlates with the human aspect by having everyday life practices that are influenced by technical knowledge as well as social science.
The Profession: Penetration Tester
With there being many cyber job roles in this generation, being a penetration tester plays a crucial role for society. To support and give a scientific description of the penetration testing role; “To summarize what a penetration tester is, Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities. It helps confirm the effectiveness or ineffectiveness of the security measures that have been implemented” (Bacudio, 2011). Furthermore, penetration testers often work with authorization that helps guarantee that such actions in organizations does not cause any harm.
Penetration Testing, Everyday
Whether one believes it or not, penetration testing plays a crucial and excessive role to society’s everyday life. Penetration does do by safeguarding services society depends on today. For example, the role of a penetration tester would prevent a hacker from accessing personal financial data on ones. To further explain, a penetration tester would find the weak servers and block them from getting into banking information. Another example can be through social media. In today’s generation, individual’s hack other individual’s account by trying to act like they are the true individual account, targeting their recent conversations. A penetration tester would make sure that your confidential information is kept safe to prevent hacking to happen.
Social Science and Hacking
Social science plays a role in penetration in ways most individuals would not know. Human behavior is a part of social science which includes sociology and psychology. Human behavior plays a crucial role in cybersecurity alone. According to ISACA, “Social engineering is the practice of manipulating people into divulging sensitive information or performing an action that allows an attacker access to a secure area” To show how and reflect on how some attackers may be tricking people into threatening security, a penetration tester would use their engineering technique, such as phishing. One would assume to have knowledge on how an individual would respond to a social science-based idea of authority etc. Furthermore, social science assist how penetration testers projects how employees in an organization’s attitude could potentially act in a certain event. Which can offer insight with potential weaknesses.
Social Principles Within the Cyber Field
To emphasize the social principles, assessing vulnerabilities through the organization’s framework. As a penetration tester, that employs social techniques that evaluate how easy an individual could be manipulated by bypassing security protocols. To further explain, “Cybersecurity ethics commonly draws upon a principlist approach, which focuses on specifying and weighing a small group of domain-relevant ethical principles” (French,2024). Principles that include trust, social, and authority exploiting phishing etc. By applying principles, being a penetration tester offers valuable insights.
Conclusion
In conclusion, when finding the cyber career penetration tester or ethical hacking, one can do so when fixing such vulnerabilities. Ethical hacking plays a crucial role in safeguarding digital infrastructures. Social science plays a role in penetration in ways most individuals would not know. Human behavior is a part of social science which includes sociology and psychology. To emphasize the social principles, assessing vulnerabilities through the organization’s framework.
References
Albrechtsen, E., Brewer, R., Christen, M., Hatfield, J., Mouton, F., Alonso, D. A., Antonakakis,
M., Awojana, T., Aycock, J., Balica, R., Banks, J., Beauchamp, T. L., Beever, J., Blanken
Webb, J., … Himma, K. E. (2021, June 25). A Principlist Framework for cybersecurity
ethics. Computers & Security.
https://www.sciencedirect.com/science/article/pii/S0167404821002066
Bacudio, A. G., Yuan, X., Chu, B., & Jones, M. (2011, November). (PDF) an overview of penetration testing. ResearchGate. https://www.researchgate.net/publication/274174058_An_Overview_of_Penetration_Testing.
Physical penetration testing: The most overlooked aspect of security. ISACA. (2023, September 5). https://www.isaca.org/resources/white-papers/2023/physical-penetration-testing.
Leave a Reply