Carter Hendrick
CYSE 201s
4/10/2024
Career Paper: Ethical Hacker
Cybersecurity has many different positions, all of which rely upon the social sciences in some way. Ethical hacking is essential to prevent attacks before they can happen by identifying vulnerabilities. As a job in cybersecurity ethical hacking also relies on the social sciences and their principles to perform the job they are given and report on their findings in a way that explains how they exploited the vulnerability that they found. Research and on-the-job experience show how ethical hacking uses social science and moral philosophies to be effective.
Ethical hacking has a few different aspects of social science to focus on due to how heavily used they are, such as social engineering. While social science is not an official specific social science it was first brought to life in social science and is used by many different practices. In ethical hacking social science can be the key to the job depending on the situation. Ethical hacking and social engineering have its own host of points to think about like how it is used and who it is most effectively used on. Social engineering is used typically to get information that can be used to gain access into a system, but getting social engineering to work is where the challenge lies. Social engineering is used on people specifically, to attain information. “Vulnerabilities can exist not only as technical vulnerabilities such as missing security “patches” but can also be vulnerabilities in processes or people,” (Thomas Georg, 2018) To combat social engineering many companies, train their employees to not answer certain types of questions as to not reveal information. Social engineering is used during much of the life of an ethical hacker and is a great tool. Joseph Hatfield has in his article, “Virtuous human hacking: The ethics of Social Engineering in penetration-testing.” has insights into social engineering and its uses such as, “Yet human-to-human manipulation, or what cybersecurity experts call “social engineering,” also plays a critical role in the discovery and exploitation of security vulnerabilities” (Hatfield 2018)
Social engineering is one of the many social science tools that is used in ethical hacking, but there is also many of the principles of social sciences used to truly show the difference between an ethical hacker and just another hacker. During the job an ethical hacker must infiltrate the systems of a company and write a report on how they did it. This is very similar to the experiments and research done in the social sciences. This includes the use of the principles such as objectivity, empiricism, and parsimony. Ethical hackers must be objective in their reports as to keep it professional and give unbiased criticism to the company. Empiricism plays a role in the recording and reporting of the actual process and techniques used by the ethical hacker so the company may recreate the vulnerability and defend the system. Parsimony plays a big part in ensuring that the instructions of the hacker are clear and easy to understand, also it makes it so the company can easily understand what parts of the system were accessed.
Human factors play a big role in ethical hacking, and not just for social engineering purposes. Humans are the ones creating the systems, the defenses, digital storage, and physical storage. All of these things will have some form of vulnerability because they were made by humans, it is up to an ethical hacker to exploit them. Humans are always the most vulnerable part of a network so that makes them easily targetable as touched on earlier with social engineering. The best thing companies and really everyone can do is to stay educated on online literacy and cybersecurity as to not create an opportunity for a hacker to steal from them. “Many cybersecurity experts frame social engineering attacks as a question of technological literacy and knowledge. According to this perspective, security incidents occur because an employee did not observe common security practices nor detect manipulative techniques used by hackers.” (Nina Klimburg-Witjes, Alexander Wentland 2021)
Works Cited:
Joseph M. Hatfield, This paper offers a virtue ethics analysis of social engineering in penetration-testing. It begins by considering previous research on this topic and argues that such attempts misconstrue or more often overlook this Aristotelian tradition. It arti, Hatfield, J. M., Mouton, F., Arendt, H., Baha, A.-S., Brenner, J. E., Chauhan, S., Davidson, D., Dimkov, T., Drake, J. R., Elovici, Y., Finn, P. R., Fulton, E., Hursthouse, R., Jefferson, T., Johnson, M., Johnson, M. R., Jones, H. S., … Levy, Y. (2019, February 28). Virtuous human hacking: The ethics of Social Engineering in penetration-testing. Computers & Security. https://www.sciencedirect.com/science/article/abs/pii/S016740481831174X
Thomas Georg, & AbstractThis paper discusses the issues of implied trust in ethical hacking. Unlike many other long-established professions. (2018, October 29). Issues of implied trust in ethical hacking. The ORBIT Journal. https://www.sciencedirect.com/science/article/pii/S2515856220300213
Nina Klimburg-Witjes, Alexander Wentland, Hacking humans? Social Engineering and the construction of … (n.d.). (2021, February 10) https://journals.sagepub.com/doi/10.1177/0162243921992844