{"id":100,"date":"2024-12-08T20:47:47","date_gmt":"2024-12-08T20:47:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/amoocyber\/?p=100"},"modified":"2024-12-08T20:47:47","modified_gmt":"2024-12-08T20:47:47","slug":"career-paper-hacking-social-science","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/amoocyber\/2024\/12\/08\/career-paper-hacking-social-science\/","title":{"rendered":"Career Paper: Hacking Social Science"},"content":{"rendered":"<p>Introduction<br \/>\n      When identifying the cyber career penetration tester or ethical hacking, one can do so when fixing such vulnerabilities. Ethical hacking plays a crucial role in safeguarding digital infrastructures. This career can be seen as such a technological career. However, this career does gravitate upon different social science concepts such as, descion-making, human behavior, different organizational dynamics, and many more. More in-depth, being a penetration tester, one would have to take account on how individuals manage their technology and make a judgement security wise. Being a penetration tester correlates with the human aspect by having everyday life practices that are influenced by technical knowledge as well as social science. <\/p>\n<p>The Profession: Penetration Tester<br \/>\n       With there being many cyber job roles in this generation, being a penetration tester plays a crucial role for society. To support and give a scientific description of the penetration testing role; \u201cTo summarize what a penetration tester is, Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities. It helps confirm the effectiveness or ineffectiveness of the security measures that have been implemented\u201d (Bacudio, 2011). Furthermore, penetration testers often work with authorization that helps guarantee that such actions in organizations does not cause any harm.<br \/>\nPenetration Testing, Everyday<br \/>\nWhether one believes it or not, penetration testing plays a crucial and excessive role to society\u2019s everyday life. Penetration does do by safeguarding services society depends on today. For example, the role of a penetration tester would prevent a hacker from accessing personal financial data on ones. To further explain, a penetration tester would find the weak servers and block them from getting into banking information. Another example can be through social media. In today\u2019s generation, individual\u2019s hack other individual\u2019s account by trying to act like they are the true individual account, targeting their recent conversations. A penetration tester would make sure that your confidential information is kept safe to prevent hacking to happen.<\/p>\n<p>Social Science and Hacking<br \/>\n\tSocial science plays a role in penetration in ways most individuals would not know. Human behavior is a part of social science which includes sociology and psychology. Human behavior plays a crucial role in cybersecurity alone. According to ISACA, \u201cSocial engineering is the practice of manipulating people into divulging sensitive information or performing an action that allows an attacker access to a secure area\u201d To show how and reflect on how some attackers may be tricking people into threatening security, a penetration tester would use their engineering technique, such as phishing. One would assume to have knowledge on how an individual would respond to a social science-based idea of authority etc. Furthermore, social science assist how penetration testers projects how employees in an organization\u2019s attitude could potentially act in a certain event. Which can offer insight with potential weaknesses.<br \/>\nSocial Principles Within the Cyber Field<br \/>\n     To emphasize the social principles, assessing vulnerabilities through the organization&#8217;s framework. As a penetration tester, that employs social techniques that evaluate how easy an individual could be manipulated by bypassing security protocols. To further explain, \u201cCybersecurity ethics commonly draws upon a principlist approach, which focuses on specifying and weighing a small group of domain-relevant ethical principles\u201d (French,2024). Principles that include trust, social, and authority exploiting phishing etc. By applying principles, being a penetration tester offers valuable insights.<br \/>\nConclusion<br \/>\n    In conclusion, when finding the cyber career penetration tester or ethical hacking, one can do so when fixing such vulnerabilities. Ethical hacking plays a crucial role in safeguarding digital infrastructures. Social science plays a role in penetration in ways most individuals would not know. Human behavior is a part of social science which includes sociology and psychology. To emphasize the social principles, assessing vulnerabilities through the organization&#8217;s framework.<\/p>\n<p>References<br \/>\nAlbrechtsen, E., Brewer, R., Christen, M., Hatfield, J., Mouton, F., Alonso, D. A., Antonakakis,<br \/>\n       M., Awojana, T., Aycock, J., Balica, R., Banks, J., Beauchamp, T. L., Beever, J., Blanken<br \/>\n      Webb, J., \u2026 Himma, K. E. (2021, June 25). A Principlist Framework for cybersecurity<br \/>\n       ethics. Computers &amp; Security.<br \/>\n       https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821002066 <\/p>\n<p>Bacudio, A. G., Yuan, X., Chu, B., &amp; Jones, M. (2011, November). (PDF) an overview of penetration testing. ResearchGate. https:\/\/www.researchgate.net\/publication\/274174058_An_Overview_of_Penetration_Testing.<br \/>\nPhysical penetration testing: The most overlooked aspect of security. ISACA. (2023, September 5). https:\/\/www.isaca.org\/resources\/white-papers\/2023\/physical-penetration-testing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction When identifying the cyber career penetration tester or ethical hacking, one can do so when fixing such vulnerabilities. Ethical hacking plays a crucial role in safeguarding digital infrastructures. This career can be seen as such a technological career. However,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/amoocyber\/2024\/12\/08\/career-paper-hacking-social-science\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27469,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts\/100"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/users\/27469"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts\/100\/revisions"}],"predecessor-version":[{"id":101,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/posts\/100\/revisions\/101"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/amoocyber\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}