{"id":387,"date":"2025-04-29T19:58:13","date_gmt":"2025-04-29T19:58:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hannahklein\/?page_id=387"},"modified":"2025-04-29T20:33:49","modified_gmt":"2025-04-29T20:33:49","slug":"career-professional-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hannahklein\/career-professional-paper\/","title":{"rendered":"Career Professional Paper"},"content":{"rendered":"\n<p>Social Science Principles Behind\u2002Penetration Testing<br><\/p>\n\n\n\n<p>One of the most vital roles in the cybersecurity arena is\u2002penetration testing, or ethical hacking. Pen testers are enlisted to\u2002launch simulated attacks on networks, systems, and applications to assist organizations in finding and fixing vulnerabilities before actual attackers exploit them. Although this\u2002job may sound all about tech and coding, it draws heavily from social science \u2014 especially when needing to understand human behavior, make ethical decisions and think about the wider impact of cybersecurity on different communities. This paper discusses how social science research and concepts are incorporated into the daily work of penetration testers, and why it is important, especially in regard to interactions with marginalized groups and members of the public.<\/p>\n\n\n\n<p><br>Human Behavior and\u2002Social Engineering<\/p>\n\n\n\n<p>One of\u2002the most common tools the penetration testers use is social engineering. This is where they try to fool somebody into\u2002surrendering sensitive information \u2014 say, impersonating a colleague in an email to obtain a password. You have been relying on these strategies from early on and to do this you need to have a basic idea of how\u2002people think and react to various situations.<br><\/p>\n\n\n\n<p>That is, they are\u2002trained on data up to 2023\/10. For example, people often trust authority figures or social norms, and can be exploited (with ethics) during a test for how susceptible a system can truly be. These tips are based on\u2002research in social psychology, including Robert Cialdini\u2019s research on influence and persuasion (Cialdini, 2009). Pen testers learn these tactics so they can use them responsibly in tests and\u2002then help companies train employees to detect real scams.<br><\/p>\n\n\n\n<p>Behavioral insights also help when\u2002assessing risk. Some people may reuse passwords across platforms, or ignore security warnings \u2014 not because they\u2019re sloppy, but because, in some cases,\u2002the security system is confusing and inconvenient. That\u2019s where concepts\u2002borrowed from behavioral science, like cognitive bias and decision-making, come into play; understanding how people act online tends to help pen testers offer up more effective, realistic security solutions.<br><\/p>\n\n\n\n<p>Testing, Ethics, and\u2002Responsibility<br><\/p>\n\n\n\n<p>Ethics is another critical area\u2002of concern for social science. Pen\u2002testers typically gain deep access into sensitive information, and they need to treat that with care. Ethical frameworks from the social sciences\u2014such as consequentialism, which focuses on achieving specific beneficial outcomes, and deontology, which emphasizes what rules and duties should govern their behavior\u2014help guide their actions (Whitman &amp; Mattord, 2019).<br><\/p>\n\n\n\n<p>A pen tester would likely encounter personal files, health records or private messages in the course of\u2002a job. They still have to ask themselves: \u201cAm I supposed to look at this, or can I look at\u2002this, or should I look at this?\u201d That sort of internal check isn\u2019t simply due to company policy \u2014 it\u2019s\u2002based on moral reasoning and ethical training, both of which are central to social science.<br><\/p>\n\n\n\n<p>For example, the format in\u2002which penetration testers present their results is important as well. They must communicate risks in an understandable form, provide realistic solutions and avoid panic. This requires communication skills, emotional intelligence and an understanding of organizational behavior \u2014 all of which\u2002are linked to social science.<\/p>\n\n\n\n<p><br>Wider Social Impact and\u2002Inclusion<\/p>\n\n\n\n<p><br>Cybersecurity impacts everyone, but not\u2002everyone the same. As penetration testers, individuals need to think about the relationship\u2002between their work and larger social issues, particularly with regard to marginalized or underrepresented communities. For example, when a healthcare system is hacked, patients with lower income or more limited access to aid services may experience more drastic\u2002consequences. \u201cPen tests help prevent this because\u2002they ensure those systems are secure in the first place. Their work has a real-world effect, and being cognizant of who is at highest risk informs\u2002not only better but also more inclusive testing.<br><\/p>\n\n\n\n<p>Research in the social sciences has also provided pen testers with insights into how individuals engage with technology at all levels. Digital literacy varies widely among\u2002users, and security recommendations need to be practical and usable even for non-expert users.<br><\/p>\n\n\n\n<p>Frameworks such as contextual integrity (Nissenbaum, 2004) inform us that privacy expectations are contextually bound and are often nuanced: the differences have bearings\u2002on how we design and assess systems.<br><\/p>\n\n\n\n<p>Conclusion<br><\/p>\n\n\n\n<p>Penetration testing may seem like a technical job, but social science is a big part of how it\u2019s practiced\u2002\u2014 and how well it\u2019s done. From using what we know about how people think and behave to conducting social engineering assessments, to applying ethical principles when exploring systems for vulnerabilities, to considering how cybersecurity challenges dozens of people and communities in different ways, social science keeps pen testers effective, conscientious, and mindful. With the evolving nature of cybersecurity threats and the increasing complexity of systems, this blend of\u2002technical acumen and empathetic engineering is more critical than ever.<br><\/p>\n\n\n\n<p>References<br><\/p>\n\n\n\n<p>Cialdini, R. B. (2009). Influence:\u2002Science and Practice (5th ed.). Pearson Education.<br>Whitman, M.E.,\u2002&amp; Mattord, H.J. (2019). (6th ed.)\u2002Principles of Information Security.<br>Cengage Learning.<br>Nissenbaum, H. (2004). Privacy as contextual\u2002integrity. Washington Law Review,<br>79(1), 119\u2013157<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Science Principles Behind\u2002Penetration Testing One of the most vital roles in the cybersecurity arena is\u2002penetration testing, or ethical hacking. Pen testers are enlisted to\u2002launch simulated attacks on networks, systems, and applications to assist organizations in finding and fixing vulnerabilities before actual attackers exploit them. Although this\u2002job may sound all about tech and coding, it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hannahklein\/career-professional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":29799,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages\/387"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/users\/29799"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages\/387\/revisions"}],"predecessor-version":[{"id":458,"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/pages\/387\/revisions\/458"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hannahklein\/wp-json\/wp\/v2\/media?parent=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}