There’s a Massive Cyber Security Job Gap – We Should Fill It by Employing Hackers

Cyber security incidents are gaining an increasingly high profile. In the past, these incidents may have been perceived primarily as a somewhat distant issue for organizations such as banks to deal with. But recent attacks such as the 2017 Wannacry incident, in which a cyber attack disabled the IT systems of many organizations including the NHS, demonstrates the real-life consequences that cyber attacks can have.

These attacks are becoming increasingly sophisticated, using psychological manipulation as well as technology. Examples of this include phishing emails, some of which can be extremely convincing and credible. Such phishing emails have led to cyber security breaches at even the largest of technology companies, including Facebook and Google.

To face these challenges, society needs cyber security professionals who can protect systems and mitigate damage. Yet the demand for qualified cyber security practitioners has quickly outpaced the supply, with three million unfilled cyber security posts worldwide.

So it might come as a surprise that there is already an active population with a strong passion for cyber security – hackers. This is a term with many negative connotations. It evokes the stereotypical image of a teenage boy sat in a dark room, typing furiously as green text flies past on the computer monitor, often with the assumption that some criminal activity is taking place. The idea of including such individuals in helping build and protect cyber systems may seem counterintuitive.

But – as we have highlighted in our recent research – the reality of hacking communities is more complex and nuanced than the stereotypes would suggest. Even the phrase “hacker” is contentious for many individuals who may be labelled hackers. This is because it has lost the original meaning: of someone who uses technology to solve a problem in an innovative manner.

Hacking today

There are a growing number of online hacking communities – and regular offline meetings and conventions where hackers meet in person. One of the largest of these events is DEFCON, held every year in Las Vegas and attended by up to 20,000 people. These hacking communities and events are an important source of information for young people who are becoming involved in hacking, and may be the first contact they have with other hackers.

Read Also: Weaponised research: how to keep you and your sources safe in the age of surveillance

On the surface, the conversations that are held on these forums often relate to sharing information. People seek advice on how to overcome different technical barriers in the hacking process. Assistance is given to those who are having difficulties – provided that they firstly demonstrate a willingness to learn. This reflects one of the characteristics of hacking communities, in that there is a culture of individuals demonstrating passion and the desire to overcome barriers.

But such events are about more than sharing practical skills. As individuals, we are strongly influenced by those around us, often to a greater agree that we are aware of. This is especially the case when we are in a new environment and unsure of the social norms of the group. As such, these online and offline hacking communities also provide an important source of social identity to individuals. They learn what is and what is not acceptable behavior, including the ethics and legality of hacking.

Myths and opportunities about cyber security

It is important to stress here that hacking is not an inherently illegal activity. There are many opportunities to engage in ethical hacking, which refers to attempting to hack systems for the purpose of finding and fixing the flaws that malicious hackers may try to exploit for criminal activity.

Our research demonstrates that the majority of people active within hacking communities have no wish to exploit the flaws they find although they do believe that such flaws should be exposed so that they can be addressed – especially when the organization concerned is holding public data and have sufficient resources that it is reasonable to feel they should not have any gaps in their cyber security in the first place. Several large and well-known companies actively engage with this culture, by offering hackers “bug bounties” – financial rewards for identifying and reporting previously undiscovered weaknesses in their systems.

Of course criminal hacking does happen – and many of the people we have spoken to acknowledge that they take part in activities that are of questionable legality in order to achieve their goal of finding the flaws in a system. This creates a risk for those people, especially young adults, who are becoming involved in hacking. Through ignorance or through being wilfully misled, they may become involved in activities that result in them gaining a criminal record.

If so, this impacts not only them as an individual but also the cyber security profession. As a result of this culture, many companies are being deprived of individuals who could have helped fill the increasingly urgent gap in cyber security professionals. To address both of these problems, we need to move past unhelpful and negative stereotypes and work with young people and hacking communities to provide an awareness of how their passion and skills can be used to address the cyber security challenges that society faces.

John McAlaney, Associate Professor in Psychology, Bournemouth University and Helen Thackray, Senior Research Associate, University of Portsmouth

This article is republished from The Conversation under a Creative Commons license. Read the original article.

3 Comments:

  1. There are many experts available, but these pose two problems for short-sighted employers:
    1. They are over 35, and thus “too old”.
    2. They correctly identify problems and propose solutions which would require non-cosmetic changes. Which would cost short-term money, even if saves money over time.

    Both positions are simply unacceptable.Everyone knows that the correct solution is for young, flexible, cheap people to solve all IT problems by working unlimited overtime.

    It is not as if IT is a profession!
    It is not as if businesses are dependent upon the correct operation of technical platforms!

    These are simply, Not Real People!

    (Elements of irony may be present!)

  2. Sadly as a 40 something year old in the IT industry you are far too correct in your assessment.

Leave a Reply

Your email address will not be published. Required fields are marked *