2019
DOI: 10.1016/j.cose.2019.02.012
|View full text |Cite
|
Sign up to set email alerts
|

Virtuous human hacking: The ethics of social engineering in penetration-testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(29 citation statements)
references
References 17 publications
0
23
0
Order By: Relevance
“…If, as a result of applying methods of influence, a social engineer has gained access to confidential information, the analogue of which is publicly available, but using manipulating models of human behavior and is caused damage, his actions are illegal. However, if the damage did not cause, the actions of the social engineer do not violate the law, although it blame for non-compliance with ethics [15]. In a situation where a social engineer obtained (or made an attempt to obtain) access to confidential information, even without using it and not causing damage by his actions, the actions are unlawful due to the impact applied to the object [16].…”
Section: Resultsmentioning
confidence: 99%
“…If, as a result of applying methods of influence, a social engineer has gained access to confidential information, the analogue of which is publicly available, but using manipulating models of human behavior and is caused damage, his actions are illegal. However, if the damage did not cause, the actions of the social engineer do not violate the law, although it blame for non-compliance with ethics [15]. In a situation where a social engineer obtained (or made an attempt to obtain) access to confidential information, even without using it and not causing damage by his actions, the actions are unlawful due to the impact applied to the object [16].…”
Section: Resultsmentioning
confidence: 99%
“…The moral and ethical positioning of white and black hat hackers provides an additional opportunity to highlight the dualistic nature of the application of knowledge. Black and white hat hackers are distinguished by the purpose of their hacking activity and whether consent has been provided (Hatfield, 2019); however, both start with the same potential aim to compromise a system and gain entry. White hat hacking is generally viewed as ethically motivated with the aim of identifying vulnerabilities in the security of a system and occurs when consent is given., e.g.…”
Section: Information Landscapes Desire Lines and Dark Knowledgementioning
confidence: 99%
“…penetration testing used in the banking industry to identify potential weaknesses in the network. Black hats represent the binary of this classification representing the unlawful entry of networks with malicious intent, and/theft of information or financial gain (Hatfield, 2019). Both categories of hackers will develop the same knowledge (about breaching networks, etc); however, the application of the knowledge will differ.…”
Section: Information Landscapes Desire Lines and Dark Knowledgementioning
confidence: 99%
“…These interactions are problematic for both parties, client and service provider, and the ethics of social engineering are quite involving (Hatfield 2019). In contrast to searching for bugs in software, social engineering uncovers unprofessional behaviour in humans.…”
Section: Executionmentioning
confidence: 99%