CYSE 201S – Career Paper

Penetration Testing and the Relation to Social Science

Penetration testing, or ethical hacking, is a critical component of cybersecurity. Professionals attempt to breach a system’s security to identify vulnerabilities and weaknesses. Although technical skills form the foundation of penetration testing, social science research and principles are also essential to the effectiveness and success of these professionals. Important social science concepts apply to penetration testers’ daily routines, focusing on the career’s relevance to marginalized groups and society in general.

Penetration testers rely heavily on social science principles to understand human behavior and its impact on cybersecurity. Social engineering attacks, such as phishing and spear-phishing, exploit human vulnerabilities and trust to gain unauthorized access to sensitive information. By incorporating psychology, sociology, and communication studies principles, penetration testers can predict, identify, and counteract these threats more effectively (Hadnagy 2018). For example, penetration testers may use principles from psychology to design realistic phishing emails, mimicking the language and emotional triggers used by malicious hackers. By understanding the psychological factors that make individuals susceptible to social engineering attacks, penetration testers can create more effective simulations and educate users on recognizing and avoiding such threats.

The interdisciplinary nature of cybersecurity necessitates effective communication and collaboration between penetration testers and other stakeholders. Principles from organizational behavior, sociology, and communication studies help professionals navigate the complex relationships and diverse perspectives involved in securing an organization’s digital assets. Penetration testers must work closely with IT teams, management, and other stakeholders to develop and implement comprehensive security strategies. Understanding group dynamics, communication styles, and conflict resolution techniques can facilitate better teamwork and more successful security outcomes.

Cybersecurity issues can disproportionately affect marginalized groups in society. For example, members of the LGBTQ+ community, racial and ethnic minorities, and individuals with disabilities may face unique challenges in protecting their online privacy and security. Penetration testers can use social science research to assist their work, ensuring that security solutions are inclusive and accessible to all users. Online social media campaigns can educate and inform people, by targeting specific groups of people online, curating specific messages to these groups, the impact of relaying best practices for secure online activity can help testers understand the scope of their practice. By incorporating findings from studies on the digital side, online harassment, and accessibility, penetration testers can develop security measures that account for the unique needs and vulnerabilities of marginalized groups (Newman 2017). This approach creates a more equitable and inclusive digital environment for all users.

Penetration testing as a cybersecurity career heavily depends on social science research and principles. Understanding human behavior, fostering effective collaboration and communication, and addressing the needs of marginalized groups are essential aspects of a penetration tester’s daily routine. Applying critical social science concepts from class, these professionals can enhance their work, create more secure digital environments, and contribute to a more inclusive and equitable society.

Works Cited

Hadnagy, Christopher. Social Engineering: The Science of Human Hacking. John Wiley & Sons, 2018.

Newman, Lily Hay. “The digital divide between rich and poor in the US is still a huge problem.” Wired, 2017, https://www.wired.com/2017/02/digital-divide-united-states/.

Ruoti, Scott, et al. “Mental Models of Computer Security Risks for Diverse Users.” ACM Transactions on Privacy and Security (TOPS), vol. 22, no. 4, 2019, pp. 1-31.

CYSE 201S – Article 1 Review

In the first article Emerging trends in cybercrime awareness in Nigeria, it relates to many principles of social science. It relates to social problems because the nature of cybercrime in this crime is a global social issue because of the outreach to the rest of the world. Nigeria tends to have a global reputation for cybercrime, especially the attempt to get money via fraudulent emails. The study was to determine the general awareness of individuals in Nigeria about cybercrime, and that they may be more aware than initially thought. This study gathered a sample of 1104 Internet users that are in Umuahia, Nigeria. They asked questions about specific types of cybercrimes on the internet, from hacking and e-theft to cyber-terrorism and identity theft. It found that many were more aware of the common cybercrimes such as hacking and ATM theft, but lesser awareness for cybercrimes like sexually related offenses and malware attacks. One social science concept that can be extrapolated from the article is Determinism, which relays that with the factors of poverty, inadequate cyber law enforcement, allows such crimes to take place in a higher factor. This intensity of cybercrime coming from this area also contributes to the awareness of cybercrime to people who aren’t actively participating in it. The contribution to society from the study is the conclusion that the data that cybercrime awareness in the specific state in Nigeria could predict cybercrime victimization. This assists in the development of criminology strategies to combat cybercrime.

https://vc.bridgew.edu/cgi/viewcontent.cgi?article=1098&context=ijcic

CYSE 201S – Bug Bounty Principles – Attention can be brought to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing skills. The policies relate to economics in that they are based on cost/benefit principles. Read the article “Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties”. Write a summary reaction to the use of the policies, focus primarily on the literature review and the discussion of the findings.

Bug bounty policies have become an increasingly popular approach for companies to address cybersecurity concerns. These policies incentivize ethical hackers, also known as white-hat hackers, to identify vulnerabilities within a company’s cyber infrastructure by offering monetary rewards. As highlighted in the referenced article, the proponents of bug bounty programs argue that they are cost-effective for organizations to improve their security posture.


The article presents an empirical study on bug bounties. The findings offer valuable insights into the effectiveness of these policies and their impact on cybersecurity. One of the key findings from the study is that security researchers have a price elasticity of supply between 0.1 and 0.2 at the median. This indicates that ethical hackers are primarily motivated by non-monetary factors, suggesting that companies with limited financial resources can still benefit from implementing bug bounty programs. This observation aligns with the broader understanding of the hacker community, where factors such as intellectual challenge, skill development, and peer recognition often play significant roles in driving their behavior.
The study also finds that a company’s revenue and brand profile do not economically impact the number of valid security vulnerability reports its bug bounty program receives. This finding is particularly relevant for smaller companies and startups, suggesting that their bug bounty programs can be just as effective as those of larger, more established organizations.


The findings suggest that these policies can benefit companies of various sizes and sectors, irrespective of their financial capabilities. Additionally, the study highlights the importance of understanding the motivations of ethical hackers and the factors that influence the success of bug bounty programs.

CYSE 201S – After watching the video “What does a Cybersecurity Analyst do? Salaries, Skills & Job Outlook”. https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job related to social behaviors. Write a paragraph describing social themes that arise in the presentation.

The video “What does a Cybersecurity Analyst do? Salaries, Skills & Job Outlook” shows that a cybersecurity analyst’s role extends beyond technical skills and involves various social aspects that influence the effectiveness and success of their work. Cybersecurity analysts must navigate between human behavior, organizations, and technology to address potential threats and secure digital assets.


The cybersecurity analyst job requires excellent communication skills. They must convey complex security concepts to a diverse audience, including non-technical stakeholders. This involves translating technical jargon into easily digestible information and effectively sharing the importance of implementing security measures to protect the organization. The ability to empathize with others and understand their concerns can help cybersecurity analysts tailor their communication style to different individuals and encourage a security-conscious mindset.


Teamwork and collaboration are crucial in a cybersecurity analyst’s role. Analysts often work in multi-disciplinary teams of IT professionals, management, and other stakeholders to develop and implement comprehensive security strategies. This requires high cooperation, coordination, and mutual understanding to ensure all team members are aligned with the organization’s security goals. Building trust and fostering a positive work environment is essential to effective teamwork and can contribute to more successful security outcomes.
A cybersecurity analyst must also understand human behavior and psychology, as cyber threats often exploit human vulnerabilities. Social engineering attacks, such as phishing and spear-phishing, rely on manipulating users’ emotions and trust to access sensitive information. Cybersecurity analysts must know these techniques to develop effective countermeasures, raise awareness, and train employees to recognize and respond to such threats.


In the video presentation, social themes include the importance of adaptability, continuous learning, and staying up-to-date with the latest trends in cybersecurity. Cyber threats’ dynamic and ever-evolving nature necessitate a proactive approach to staying informed and acquiring new skills.

CYSE 201S – Complete the Social Media Disorder Scale. How did you score? What do you think about the items on the scale? Why would you think that different patterns are found across the world?

According to the questions from the social media disorder scale I would score a 0. I don’t participate in social media at all, so scoring a 0 makes complete sense.

The items on the scale are interesting because it shows what symptoms can be when people are using social media at an unhealthy rate. For example, the question “Have you regularly felt dissatisfied because you wanted to spend more time on social media?” is illuminating because it shows how some people may feel when not using it.

The world data is eye-opening because there are some pre conceived notions about who is using the social media the most, and who is being affected. The data about who is at risk for cyberbullying around the world is interesting to be mostly european countries. Then also the statistic that for the most part, girls are at a higher risk than boys. Through a social science lens, different cultures may interact in particular ways to each other.

CYSE 201S – After watching the video “Hacker Rates 12 Hacking scenes in movies and TV, How Real is it?” How do you think the media influences our understanding of cybersecurity?

The media plays a significant role in shaping public perceptions and understanding of various subjects, including cybersecurity. After watching the video “Hacker Rates 12 Hacking scenes in movies and TV, How Real is it?,” it becomes clear that media portrayals of hacking and cybersecurity can inform and mislead audiences, depending on how accurately these concepts are presented.


One of the ways media influences our understanding of cybersecurity is by sensationalizing hacking incidents and cyberattacks. Movies and TV shows often depict hackers as omnipotent, mysterious figures capable of infiltrating any system with a few keystrokes. While these portrayals can be entertaining, they often exaggerate the capabilities of hackers and create unrealistic expectations about the ease and speed of hacking. This can lead to a misunderstanding of cybersecurity’s true complexity.


Media representations of hacking may oversimplify or misrepresent the methods used by hackers. For instance, movies and TV shows often show hackers using flashy, visually engaging interfaces or performing complex tasks in seconds. Hacking requires a deep understanding of computer systems, networks, and programming languages. Cyberattacks can take days, weeks, or even months to execute. The media risks perpetuating misconceptions about cybersecurity by portraying hacking as a simple, fast-paced activity.
On the other hand, media coverage of high-profile cyberattacks and data breaches has raised public awareness of the importance of cybersecurity. News stories about large-scale hacks and their consequences have highlighted the vulnerability of personal and corporate data, emphasizing the need for robust cybersecurity measures. This increased awareness can encourage individuals and organizations to proactively protect their digital assets and invest in stronger security systems.


Some movies and TV shows like “Mr. Robot” has begun to include more accurate portrayals of hacking and cybersecurity, often with the help of expert consultants. These accurate depictions help educate viewers about the complexities of cybersecurity and the realities of working in the field. By presenting a more nuanced and realistic view of hacking, the media can contribute to a better understanding of cybersecurity challenges and solutions.

CYSE 201S – Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake?

Fake Website: BankofAmer1ca.com vs. Real Website: BankofAmerica.com This website was found in a phishing attempt, and seen when putting the cursor over the link in the email. The fake website utilizes a similar URL to the real one, but it replaces the letter “i” with the number “1” – a technique called typosquatting. Upon closer inspection, the fake site has low-quality design, misspellings, or grammar errors that the legitimate Bank of America site does not have. The real website also uses HTTPS encryption, as indicated by the padlock icon in the address bar, ensuring a secure connection between the user and the site.

Fake Website: Amaz0n-secure-login.com vs. Real Website: Amazon.com Another phishing attempt stating there is an error with my Amazon Prime Subscription, the fake website uses a deceptive URL to make users believe they are visiting a secure login page for Amazon. However, the real Amazon website doesn’t have a separate domain for logging in. The fake site may lacks visual consistency with the official site, such as different fonts, colors, or layout and sizes. The official Amazon site always uses HTTPS encryption and has a valid SSL certificate to guarantee user data protection.

Fake Website: PayPa1-security.com vs. Real Website: PayPal.com This is from quick googleing with mispelling, the fake website uses the same typosquatting technique as the first example, replacing “l” with “1”. Additionally, the fake site may have a different or outdated design compared to the legitimate PayPal website. Authentic PayPal URLs will always begin with “https://www.paypal.com/,” followed by the specific country code or a page within the main domain. 

CYSE 201S – Review the articles linked with each individual motive. Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.CYSE 201S –

  1. For Money: This motive ranks first as it is the most tangible and easily understood reason for someone to engage in cybercrime. Financial gain is a powerful incentive. Many hackers are attracted to making money through cyberattacks, fraud, and selling stolen data.
  2. Political: Cyber-activism and politically motivated attacks have become more prevalent recently. Hackers may target specific organizations or governments to make a political statement, influence policy, or protest against perceived injustices. This motive ranks second because it is also a strong driving force for hackers.
  3. Revenge: Personal grudges and a desire for vengeance can lead individuals to engage in cybercrime. This motive ranks third because it is an emotional driver that can push people to take drastic actions, even if the outcome is not financially rewarding.
  4. Recognition: The desire for recognition and fame can motivate hackers to engage in high-profile cyberattacks. This ranks fourth because, while not as strong a motive as financial gain or political activism, it still has the potential to push individuals to seek attention and validation through cybercrime.
  5. Entertainment: Some hackers may engage in cybercrime purely for the thrill or excitement it brings. This motive ranks fifth, as it is not as strong as other motives but can still lead individuals to cause harm or breach data security.
  6. Boredom: Boredom can lead to cybercrime when individuals seek new challenges or look for ways to pass the time. This ranks sixth, as it is a less focused motive. However, it contributes to increased cyberbullying, online sexual grooming, and other malicious activities.
  7. Multiple Reasons: This category encompasses various motives, making pinpointing a specific reason difficult. Even though multiple factors can bundle into a larger reason why they would do the cybercrimes, a more focused reason would make more sense.

CYSE 201S – Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need.

My experiences with technology have played a significant role in fulfilling each level of my needs. The hierarchy has five levels: physiological, safety, love and belonging, esteem, and self-actualization.

At the physiological level, technology has made it easier for me to access basic necessities such as food, water, and shelter. For example, I can use mobile apps like Instacart to order groceries online or Uber Eats to deliver food to my doorstep. Websites and DIY videos on Youtube have helped hone the skill of home improvement.

Safety needs are met through various technological innovations that provide me with security and stability. For instance, I have a home security system with surveillance cameras and a mobile app that allows me to monitor my property remotely. I utilize password managers to ensure that my online accounts are secure. I stay informed about potential threats through various news apps and websites.

In terms of love and belonging, technology has played a pivotal role in my ability to maintain relationships with friends and family. Online communication and gaming have helped me connect with friends when we are all busy. I’ve made new connections through online communities and forums, expanding my connections through hobbies beyond geographical boundaries.

As for esteem needs, technology can help with self-improvement information. I always strive to learn new ways to study, learn new techniques, and online strength training instruction. With that technological capability, I have gained self-esteem through carrying out the guides.

In the realm of self-actualization, technology has been instrumental in my personal and professional growth. Access to online courses, tutorials, and resources has allowed me to continuously learn and develop new skills.

CYSE 201S – Visit PrivacyRights.org to see the type of publicly available information about data breaches. How might researchers use this information to study breaches?

Researchers can use the publicly available information about data breaches on PrivacyRights.org to study various aspects, including the incidents’ frequency, nature, and consequences. By analyzing the data on this website, researchers can identify trends in data breaches over time, such as the types of organizations that are most frequently targeted or the types of data that are most commonly compromised. They can also examine the factors that contribute to data breaches, such as the vulnerabilities in IT systems, the actions of insiders, or the tactics of external attackers.
Researchers can use the information on PrivacyRights.org to study the impact of data breaches on individuals and organizations. For instance, they can investigate the financial costs of data breaches, such as responding to the incident, repairing the damage, and compensating affected individuals. They can also examine the reputational costs of data breaches, such as the loss of trust and credibility that organizations may suffer due to the incident. See the paragraph below from Privacyrights.org about how not everyone enjoys the same protections:

However, five years later not everyone enjoys the same level of protections in their respective state. Each year, we closely analyze each data breach notification statute along key provisions, allowing us to identify disparities in the level of protections that each statute affords. Download our report and use our interactive dashboard (or the underlying database) to compare states’ data breach notification statutes against themselves and across key metrics.

Researchers can use the data on PrivacyRights.org to evaluate the effectiveness of data breach notification laws in different states. By comparing the provisions of these laws across states and over time, they can identify the strengths and weaknesses of these laws and determine whether they are achieving their intended goals. They can also investigate how the implementation and enforcement of these laws vary across states and how they are perceived by affected individuals and organizations.