Hello friends Welcome to our blog"Science and technology". you can learn here many things about the science and technology without money. This blog generally tells you about the science and technology with updated knowledge. we are trying to post something knowlegable and something different with new thing ,which is really good for you.so please be contact with us .

Tuesday, March 20, 2018

What Are 'Black Hat' and 'White Hat' Hackers?


Definition - What does White Hat Hacker mean?

A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.
White hat hackers are usually seen as hackers who use their skills to benefit society. They may be reformed black hat hackers or they may simply be well-versed in the methods and techniques used by hackers. An organization can hire these consultants to do tests and implement best practices that make them less vulnerable to malicious hacking attempts in the future.
For the most part, the term is synonymous with "ethical hacker." The term comes from old Western movies where the cliché was for the "good guy" to wear a white cowboy hat. Of course, the "bad guys" always seemed to wear a black hat.
A hacker is a tech-savvy user who manipulates and bypasses computer systems to make them do the unintended. Sometimes this manipulation is noble, with the goal to create something beneficial.  hacking is harsh and done with the wicked goal to hurt people through identity theft or other harmes.
You are likely familiar with the stereotypical 1980's hacker: the evil criminal who is socially isolated. While this stereotype does indeed describe some modern 'black hat' hackers, there exists a subset of hackers who are not criminals. In fact, there are many hackers who use their knowledge for good.

Today, 'Hacker' is a Descriptor That Subdivides Into Three Categories:

  1. 'Black Hat' Hackers: criminals and wrongdoers.
  2. 'White Hat' Hackers: ethical hackers who work to protect systems and people.
  3. 'Grey Hat' Hackers: dabble in both black hat and white hat tinkering.
01
of 05

Classic 'Black Hat' Hackers = Criminals/Lawbreakers

'Black hat hacker' = criminal with evil intent
 'Black hat hacker' = criminal with evil intent. Gu / Getty
This is the classic definition of a hacker: a computer user who willfully vandalizes or commits theft on other people's networks.
'Black hat' is a stylish way to describe their malicious motivations. Black hats are gifted but unethical computer users who are motivated by feelings of power and petty revenge. They are electronic thugs in every sense of the word, and they share the same personality traits as emotionally stunted teens who smash bus stop windows for personal satisfaction.
Black hat hackers are renowned for the following common cybercrimes:
02
of 05

'White Hat' Ethical Hackers = Network Security Specialists

'White hat' hacker = security professional
 'White hat' hacker = security professional. Yan / Getty
Different from the classic black hat hackers, white hat hackers are either driven by honorable motivations, or they are mercenaries working on honorable agendas. Also known as 'ethical hackers', white hats are talented computer security users often employed to help protect computer networks.
Some white hats are reformed black hats, like former convicts who take on work as store security guards. While they themselves may have been unethical in the past, their current vocation is considered a white hat.
Ethical hackers are motivated by a steady paycheck. It is not surprising to see ethical hackers spending those paychecks on very expensive personal computers in their personal lives, so they can play online games after work. As long as they have a good-paying job to support their personal habits, an ethical hacker is usually not motivated to destroy nor steal from their employer.
Special note: some white hat hackers are 'academic hackers'. These are computer artisans who are less interested in protecting systems, and more interested in creating clever programs and beautiful interfaces. Their motivation is to improve a system through alterations and additions. Academic hackers can be casual hobbyists, or they can be serious computer engineers working on their graduate-level degrees.
03
of 05

'Grey Hat Hackers' = Conflicted, Uncertain Which Side of the Law They Stand

Grey hat hackers: a mix of good and evil
 Grey hat hackers: a mix of good and evil. Peoplemages / Getty
Grey hat hackers are often hobbyists with intermediate technical skills. These hobbyists enjoy disassembling and modifying their own computers for hobby pleasure, and they will sometimes dabble in minor white collar crimes like file sharing and cracking software. Indeed, if you are a P2P downloader, you are a type of gray hat hacker.
Gray hat hackers rarely escalate into becoming serious black hat hackers.
04
of 05

Subcategories of Hackers: Script Kiddies and Hacktivists

  • Script Kiddies: this is a stylish name for novice hackers who are unskilled. Script kiddies can be white hat, black hat, or grey hat. 
  • Hacktivists: this is the hacker who is also a social activist fighting for a cause. Some people would argue that famous hackers like Lulzsec and Anonymous are hacktivists fighting government corruption and corporate misdeeds. Hacktivists can be white hat, black hat, or grey hat.
05
of 05

More About Computer Hackers

Computer hacking is exaggerated by the media, and very few public narratives give hackers the fair shake that they deserve. While most movies and TV shows of hackers are absurd, you might consider watching Mr. Robot if you want to see what hacktivists do.
Every savvy web user should know about the unsavory people on the Web. Understanding common hacker attacks and scams will help you navigate online intelligently and confidently.

No comments:

Post a Comment

Follow us and supporting us.
For more information comment below: