Want to create interactive content? It’s easy in Genially!
White, Grey, and Black Hat Hackers
Sean Fitzgerald
Created on October 22, 2024
DTSC5303 - Assignment 4.1B
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
These three forms of hacking are related to cyber security because white hats are working to secure networks and prevent black hats from achieving their goals and grey hats can be helpful in doing the same, but their actions are not sanctioned and are therefore, technically illegal.
White, Grey, and Black Hat Hackers
DTSC5303 - Assignment 4.1B
Ethical vs. Unethical Hacking Whether hacking is ethical or not comes down to having the authorization to access the system and if any damage is done during the hack.
1969
MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work better and/or faster.
1984
Bill Landreth, aka ‘The Cracker’, is convicted of hacking computer systems and accessing NASA and Department of Defense computer data.
1986
The Computer Fraud and Abuse Act in US adopted
2002
A massive attack against 13 root domain servers of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net.
Info
Info
Info
Additional Sources
20XX
Use this space to add cool interactivity. Include text, images, videos, tables, PDFs... even interactive questions!
20XX
Use this space to add cool interactivity. Include text, images, videos, tables, PDFs... even interactive questions!
20XX
Use this space to add cool interactivity. Include text, images, videos, tables, PDFs... even interactive questions!
20XX
Use this space to add cool interactivity. Include text, images, videos, tables, PDFs... even interactive questions!
White Hat Hackers are usually security researchers or penetration testers.Their actions are sanctioned by the companies that they are hacking and they are getting paid for their actions. Normally, they have authorization to test a system for vunerabilities but have to report those vunerabilities once they find them and are not allowed to exploit them
White Hat Hacker
Certified Ethical Hacker
Grey Hat Hackers generally are not operating with malicious intent or the intent to cause damage, however, they are usually operating without the consent or authorization of the entity or organization that they are hacking. They usually report the vunerabilities they find to the affected company with hopes of getting a fee for find and/or fixing the issue. Sometimes, they hack in order to bring awareness to vunerabilities or lack of safety within certain systems, usually with the hopes of notorioty or recognition.
Grey Hat Hacker
Hacktivist
Black Hat Hackers are the ones that you see all of the news stories about. They are the ones that are accessing company systems in order to steal data or information to sell for a profit. Sometimes, black hat hackers are not even looking for financial gain, but just to cause damamge or chaos. Black hat hackers can be part of large criminal organizations that can be set up and run just like legitimate companies, but are operating completing outside the bounds of the law.
Black Hat Hacker
Cyber Criminal
Additional Sources
- https://encyclopedia.kaspersky.com/knowledge/a-brief-history-of-hacking/
- https://www.geeksforgeeks.org/difference-between-hacking-and-ethical-hacking/
- https://www.upguard.com/blog/difference-between-cybersecurity-and-ethical-hacking