White, Grey, and Black Hat Hackers
Taihei Sone
Created on October 22, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
HISTORY OF THE CIRCUS
Presentation
AGRICULTURE DATA
Presentation
LAS ESPECIES ANIMALES MÁS AMENAZADAS
Presentation
WATER PRESERVATION
Presentation
BIDEN’S CABINET
Presentation
YURI GAGARIN IN DENMARK
Presentation
C2C VOLUNTEER ORIENTATION
Presentation
Transcript
White, Grey, and Black Hat Hackers
Taihei Sone
Increase in cyber warfare between nations
Increase in cyber attacks and rise of white hat hackers
Popularization of the Internet and online attacks
Hacking of computers
Hacking of telephone lines
A brief history of hacking
1970s
1980s
1990s
2000s
2010s
White / grey / Black Hat Hackers
White
White hat hackers are called “ethical hackers” or “good hackers”, who exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
GREY
Gray hat hackers look for vulnerabilities in a system without the owner's permission and report issues to the owner, sometimes requesting a small fee to fix them.
Black
Black hat hackers are criminals who break into computer networks with malicious intent and motivated by self-serving reasons, such as financial gain, revenge, or simply to spread havoc.
<Unethical>
<Ethical>
Ethical vs. Unethical hacking
Often conducted by white hat hackers.
Test internet systems to find bugs and security loopholes.
An effort to help organizations lock them down before black hat hackers.
Often conducted by black hat hackers.
Violate computer security and break into systems.
For personal or financial gain, destructive motives, or other malicious intent.
How all three forms of hacking-related to Cyber Security
- White hat hackers contribute to strengthening security measures and reduce the risk to companies.
- Grey hat hackers sometimes cause uncertainty, but the discovery and reporting of vulnerabilities can ultimately lead to improved security.
- Black hat hackers threaten the safety of systems and data, creating significant risks for companies and individuals.
three additional sources
- Anderson, R. (2010). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
- Dhananjay, R. (2020). Hacking: The Art of Exploitation. No Starch Press.
- McCoy, K. (2017). Ethical Hacking and Penetration Testing Guide. Wiley.