Want to create interactive content? It’s easy in Genially!

Reuse this genially

Hacking: White, Grey, and Black Hats

Carl Klein

Created on October 28, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Smart Presentation

Practical Presentation

Essential Presentation

Akihabara Presentation

Flow Presentation

Pastel Color Presentation

Terrazzo Presentation

Transcript

Hacking: White, Grey, and Black Hat Hackers

Start

Index

A Brief History of Hacking

White Hat Hackers

Grey Hat Hackers

Black Hat Hackers

Ethical vs. Unethical Hacking

Cyber Security Relation

Sources

A Brief History of Hacking

1975 - Homebrew Computer Club

2014 - Russians Hack the White House

1957 - Phone Phreaks

1990 - Operation Sun Devil

2000 - Mafiaboy

1972 - Steve Wozniak

2017 - WannaCry

1988- Kevin Mitnik

1999 - The Melissa Virus

2010 - Stuxnet Worm

The good guys. These hackers operate within the bounds of computer access laws, and are often paid by companies to test where their vulnerabilities are to protect against cyber threats! This service is often called penetration testing. They are considered ethical.

White Hat Hackers

The middle ground, or proverbial "grey" area hacker. These hackers often act outside of permissions. They may hack a system without the permission of the company to try and hack the system, and then reveal to the company where their vulnerabiltiy was. Questionable but acceptable code of ethics.

Grey Hat Hackers

The bad guys. These hackers are the cybercriminals, and the reason why cybersecurity exists in the first place. They operate on a purely personal (normally financial) basis. No doubt, these are the unethical hackers.

Black Hat Hackers

The ethics behind hacking is tied within the type of "hat" a hacker is. White hat is normally thought of as ethical, black hat as unethical, and then grey hat is somewhere between.

Ethical vs. Unethical Hacking

Cybersecurity and the Hats

It's a game of tit for tat when it comes to white hat hackers versus black hat hackers. Cybersecurity wouldn't be necessary without black hat hackers trying to steal money and data, and without them, white hat hackers wouldn't be necessary to find vulnerabilities before black hat hackers do. For the grey hat hackers, they learn from both and generally keep it in the "grey" area.

References

Types of Hackers (video)

True Truth about Hackers

Black hat, White hat, and Gray hat hackers

White vs Gray vs Black Hat Hacking

The History and Evolution of Hacking

What is Hacking?

Ethical Hacking Course