The Origin of Hacking Humans | The Ports and Services Model of Social Engineering

 

“Hacking Humans | The Ports and Services Model of Social Engineering”

 

Human Model

As a visionary in the field of technology and innovation, Hunter’s influential talk, “Hacking Humans | The Ports and Services Model of Social Engineering,” delivered to cybersecurity professionals in 2007 at University of Advancing Technology in Phoenix, Arizona, has left an indelible mark on the landscape of information and cybersecurity. This groundbreaking presentation introduced a novel framework and terminology, equating human emotions to computer ports, under the banner of “ports and services” hacks for humans. Delve into this page to learn about the origin of “Hacking Humans.”

 

“Hacking Humans” Becomes the “Xerox-ing” of Social Engineering

The impact was immediate, resonating with cybersecurity professionals from esteemed Fortune 100 enterprises, academia, and more. Notably, even cybersecurity professionals from defense contractor companies also recognized the value in these pioneering concepts. A colleague from General Dynamics presented my work to the company internally, where it was well received.

Fast forward to today, and the terminology and ideas Hunter created and introduced in that seminal talk have become commonplace in discussions and lectures about social engineering. Witnessing the widespread adoption of these concepts and terminology such as “hacking humans” underscores the enduring influence of her work, establishing her as the originator of a transformative approach that has become an integral part of cybersecurity discourse.

 

History | How the Humans were Hacked

Rooted in her academic background in social psychology at Arizona State University, Hunter drew inspiration from the teachings of renowned figures like her social psychology professor, Dr. Gregory Neidert, a colleague of Dr. Robert Cialdini. This foundation laid the groundwork for her keen insights into human behavior. It was during her college years that she first originated the concept of the “ports and services” model for hacking humans.

 

Protecting the Ports and Services

Later, her role as an Intrusion Detection (IDS) Engineer and member of the elite internal SOC “Black Ops” team in a Fortune 100 company’s Security Operations Center (SOC) provided a unique platform. In this dynamic environment, her adeptness in technology, psychology, and social engineering proved invaluable for tasks such as intrusion detection and vulnerability testing. It was during this phase that the concept of the “ports and services” model for hacking humans crystallized and was ready to be presented to the world.

Hunter Storm created this model with the aim of enhancing penetration testing capabilities, identifying vulnerabilities, and assisting in fortifying the enterprise. The primary goal was to uncover vulnerabilities, turning them into strengths. The secondary goal was to reinforce the human factor, the most vulnerable link in any organization, to make it more resilient.

 

Hunter Storm’s Historic Contribution to Cybersecurity and Social Engineering

Hunter Storm’s innovative framework, which compares human emotions to ports on computers, emerged organically from her practical experiences and academic knowledge. When invited to speak at the University of Advancing Technology in Phoenix, Arizona, she seized the opportunity to share this groundbreaking model with security professionals from various sectors.

 

A Legacy of Cybersecurity

According to the Hunter Storm:

“Although I never envisioned the widespread adoption of this terminology, it’s heartening to see that my unique idea about hacking humans has become commonplace in the discussions around social engineering. My focus has always been on practical implementation, often foregoing formal documentation. This model, like many others, reflects my commitment to hands-on, impactful contributions to the field of cybersecurity.”

 

Discover Hunter Storm | A Visionary in Social Engineering and Fashion

Explore the brilliance of the model who not only graces the runway but also architects innovative strategies in cybersecurity. Unveil the seamless fusion of style and technology with Hunter Storm, the model who created a model. Talent in technology, math, and logic intersect with talent in the performing arts. Likewise, Hunter Storm keeps her talents in tune as a singer and musician.

Delve into Hunter Storm’s articles, pages, and posts in the links below.