Want to create interactive content? It’s easy in Genially!
Get started free
The Three Hats of Hackers
6
Created on October 24, 2024
White, grey, and black hat hackers explained
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Psychedelic Presentation
View
Chalkboard Presentation
View
Witchcraft Presentation
View
Sketchbook Presentation
View
Genial Storytale Presentation
View
Vaporwave presentation
View
Animated Sketch Presentation
Transcript
White, Grey, & Black Hat Hackers
Michael Van Vuuren
History of hacking
- Began in the 1960s with phone phreaking
- Mimicked phone signals
- Evolved rapidly since the 1980s
- Nowadays computer hacking is common
- Malware, phishing, exploits, injections, tunneling...
white hat
grey hat
black hat
- Helpful
- Identify and fix vulnerabilities
- Work with organizations to improve cybersecurity defenses
- Reverse engineering, network scanning, exploting vulnerabilities then creating patches, etc.
- Either helpful or harmful
- Identify vulnerabilities
- Not directly working with organizations
- Sometimes uses illegal methods
- Compensation may determine whether they are harmful or helpful
- Harmful
- Break into systems with malicious intentions
- Self serving
- Typically uses illegal methods like malware and ransomware
- Cybercrime, cyberwarfare, piracy, phishing, and identity theft, etc.
Unethical hacking
- Think black hat hackers
- Performed without permission
- For personal gain
- Ignores cybersecurity laws
- Often hidden
- Likely to damage systems and compromise data
- Targets everyday people and organizations alike
Ethical hacking
- Think white hat and sometimes grey hat hackers
- Authorized by the organization
- Improves security and identifies vulnerabilities
- Follows the law
- Documented outcomes
- No intent to harm or exploit
- Not hidden from organization
VS
Relation to cybersecurity
White hats and often grey hats discover vulnerabilities and subsequently strengthen systems. Black hats exploit vulnerabilities to hack systems, and thus must be defended against.
Additional sources
Online community for network security: https://owasp.org/ Additional types of hackers: https://www.pandasecurity.com/en/mediacenter/14-types-of-hackers-to-watch-out-for/ Hacking techniques: https://www.rapid7.com/fundamentals/types-of-attacks/