The Ethical Hacker Pathway: Exploring Positive Cyber Behavior
Cybercrimeology1 Jan 2025

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:
  • Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, bug bounty programs, or professional roles.
  • Research Focus: Dr. Weulen Kranenbarg’s studies highlight a significant overlap between positive and negative cyber behaviors, particularly among IT students, and explore how individuals transition toward ethical hacking.
  • Ethical Hacking as a Pathway:
    • Early positive experiences, such as reporting vulnerabilities to schools or organizations, can strongly influence individuals toward ethical hacking.
    • Responses from organizations play a critical role—positive reinforcement encourages further ethical behavior, while negative experiences can deter individuals.
  • Challenges in Defining Ethics:
    • Ethical hackers themselves debate the boundaries of what constitutes ethical behavior, such as whether making vulnerabilities public is acceptable if organizations fail to act.
    • The term "ethical hacker" is often contentious within the community.
  • Role of Education: Schools struggle to address and guide ethical behavior among IT students effectively. Clear vulnerability disclosure policies and ethics education in IT programs are crucial.
  • Future Research Directions: Dr. Weulen Kranenbarg plans to conduct life-history interviews with hackers to better understand their pathways and influences toward ethical behavior.
About our Guest:

Dr Marleen Weulen Kranenbarg

https://research.vu.nl/en/persons/marleen-weulen-kranenbarg

Papers or Resources Mentioned:Additional Resources:Capture the Flag (CTF) events:

Hack the Box - A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.

https://www.hackthebox.com

NorthSec - A popular in-person CTF competition designed for everyone excited about cybersecurity.

https://nsec.io

Bug Bounty Programs:

HackerOne - A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.

https://www.hackerone.com

Bugcrowd - A platform that hosts bug bounty programs for a wide range of companies and industries.

https://www.bugcrowd.com

Avsnitt(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Juli 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Juni 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Maj 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Apr 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Mars 202521min

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussi...

1 Feb 202522min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Dec 202425min

Populärt inom Utbildning

historiepodden-se
rss-bara-en-till-om-missbruk-medberoende-2
det-skaver
harrisons-dramatiska-historia
nu-blir-det-historia
roda-vita-rosen
not-fanny-anymore
alska-oss
johannes-hansen-podcast
sektledare
sa-in-i-sjalen
rss-max-tant-med-max-villman
allt-du-velat-veta
rss-viktmedicinpodden
rikatillsammans-om-privatekonomi-rikedom-i-livet
rss-foraldramotet-bring-lagercrantz
i-vantan-pa-katastrofen
rss-sjalsligt-avkladd
rss-basta-livet
sex-pa-riktigt-med-marika-smith