In: Computer Science
I need an abstract on black, white, and gray hat hackers. please include any references
The relationship between a hacker,the system he attacks and the actions that he takes defines whether a hacker is white, black, and grey hacker.
Black Hat Hackers
The term "black hat" originated in Western films, wherever dangerous individuals wore black hats and good individuals wore white hats.
A black hat hacker could be a one who tries to achieve unauthorized entry into a system or network to take advantage of for malicious reasons. Black-hat hackers don't have any permission or authority to target their goals.A black-hat hacker could also find some security vulnerability and sell it to criminal organizations on the black market or use it to compromise those systems.
They attempt to break security systems by compromising, neutering the functioning of internet sites and networks, or shut down the system. They typically try this to steal passwords, access or steal money/data and different personal knowledge.
White Hat Hackers
White-hat hackers, on the opposite hand, are deemed to be the
nice guys, operating with organizations to strengthen the safety of
a system. A white hat hacker has permission to penetrate the
systems and to compromise them by given the rules of
engagement.
White-hat hackers are typically noted as moral hackers. This
individual is an expert of ethical hacking tools, techniques
and associated methodologies to secure an organization’s
information systems.
Unlike black-hat hackers, these hackers exploit security networks
and appearance for backdoors once they are legally permitted to do
such. White-hat hackers disclose each vulnerability they notice
within the company’s security system so it may be patched before
they're being exploited by malicious sources.
Many fortune 50 companies like Facebook,Twitter, Microsoft, and Google also use white-hat hackers.They also run bounty programs for vulnerabilities to be found and pay handsomely to their finders.
Grey Hat Hackers
Grey hats exploit networks and information systems within the manner that black hats do, however they do so without any type of malicious intent, revealing all loopholes and vulnerabilities to enforcement agencies or intelligence agencies.
A gray-hat hacker lies somewhere between black hat and white
hat. A gray hat usually don't work for their own personal gain or
to cause harm, but they may technically commit cyber crimes and do
arguably unethical things.
Usually, grey-hat hackers surf internet and hack into computer
systems to give notice to the administrator or the owner that their
system/network contains one or many unknown vulnerabilities that
has to be rectified at once. gray hats may extort the hacked,
giving to correct the defect for a nominal fee.
References: