Ethical Hacking and the Social Sciences

Ethical Hacking

According to C.C. Palmer, Ethical Hacking is described as a hacker that “would employ the same tools and techniques as the intruders, but they would neither damage the target systems nor steal information. Instead, they would evaluate the target systems’ security and report back to the owners with the vulnerabilities they found and instructions for how to remedy them” (Palmer, 2001, p. 769). Ethical Hackers are often employed through third parties for companies seeking to have their systems tested by an outside source. These hackers not only have to have the skills to hack, but also intense knowledge on software, hardware, and operating systems. They have to be able to keep up with the ever changing world in technology, along with having social engineering awareness and incorporating human factor considerations. 

The Social Sciences

Social engineering is vital for Ethical Hackers. Based on Samuel Thompson’s research, “Social engineering succeeds because most people work under the assumption that others are essentially honest.. By making seemingly innocuous requests in a way that seems reasonable at the time, the social engineer can gather the information that he or she is looking for.” (Thompson, 2006, p.1). Social engineering uses psychological factors in order to gain trust and manipulate. Ethical hackers but have the training and knowledge to be a social engineer successfully. Human Factors also have to be considered for ethical hackers. Alongside detecting vulnerabilities, these hackers also set instructions for companies to remedy them. Taking human factors into consideration, knowing how humans are capable and taking limitations into the design and development, hackers have to understand the company’s employee weaknesses in their remedy, and plan accordingly in their course of action. 

Marginalization 

There are many ways that Ethical Hackers have to take marginalization of minorities into consideration. When Ethical Hackers are employed by lower funded companies, they have to take into consideration what type of security the company has and can afford when they are planning. They will also have to focus on the vulnerabilities that largely affect those minorities that might be different from bigger funded companies. Ethical Hackers also have to advocate for inclusive and accessible technologies. According to Jim Tobias, in his article on Accessible Technology, “professionals must be able to absorb new technologies, identify their implications for accessibility, and provide guidance to engineers and designers” (Tobias, 2003, p. 600). Ethical Hackers have to take into consideration how certain companies have to have accessibility for all users, within their remedy program they have to keep that in mind. 

Society 

There has been an increase in individuals wanting to gain more knowledge on technology at a young age. In an article written by Noordegraaf and Kranenbarg, young people have begun to show interest in ethical hacking. In their research they have found that the majority of influence of young ethical hackers come from society and peer influence. “Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers” (Noordegraaf, et al., 2023, p.803). The encouragement of young individuals to get into hacking can lead to hackers with much more experience and knowledge when they get into adulthood. 

Conclusion

Ethical Hackers have great influence in society. Their primary job is to help and protect online systems, which in part, protects society. Companies hire ethical hackers so they can protect the company and their customers. Without ethical hackers, vulnerabilities will only be known when they are discovered by malicious hackers. But it must be noted that ethical hackers chose to be ethical, anyone who has the capability to hack can use it negatively. Ethical hackers show that their primary focus is to help and aid in the protection of networks and cyber security. 

Works Cited 

Noordegraaf, et al. (2023). Why Do Young People Start and Continue with Ethical Hacking? A Qualitative Study on Individual and Social Aspects in the Lives of Ethical Hackers. Criminology & Public Policy, vol. 22(4) p. 803-824. DOI: 10.111/1745-9133.12650

Palmer, C.C. (2001). Ethical Hacking. IBM Systems Journal, vol. 40(3) p. 769. DOI: 10.1147/sj.403.0769

Tobias, Jim. (2003). Information Technology and Universal Design: An Agenda for Accessible Technology. Journal of Visual Impairment & Blindness, vol. 97(10) p. 592-601. DOI: 10.1177/0145482×0309701004