Question

In: Computer Science

I need an abstract on black, white, and gray hat hackers. please include any references

I need an abstract on black, white, and gray hat hackers. please include any references

Solutions

Expert Solution

The relationship between a hacker,the system he attacks and the actions that he takes defines whether a hacker is white, black, and grey hacker.

Black Hat Hackers

The term "black hat" originated in Western films, wherever dangerous individuals wore black hats and good individuals wore white hats.

A black hat hacker could be a one who tries to achieve unauthorized entry into a system or network to take advantage of for malicious reasons. Black-hat hackers don't have any permission or authority to target their goals.A black-hat hacker could also find some security vulnerability and sell it to criminal organizations on the black market or use it to compromise those systems.

They attempt to break security systems by compromising, neutering the functioning of internet sites and networks, or shut down the system. They typically try this to steal passwords, access or steal money/data and different personal knowledge.

White Hat Hackers

White-hat hackers, on the opposite hand, are deemed to be the nice guys, operating with organizations to strengthen the safety of a system. A white hat hacker has permission to penetrate the systems and to compromise them by given the rules of engagement.

White-hat hackers are typically noted as moral hackers. This individual is an expert of ethical hacking tools, techniques and  associated methodologies to secure an organization’s information systems.

Unlike black-hat hackers, these hackers exploit security networks and appearance for backdoors once they are legally permitted to do such. White-hat hackers disclose each vulnerability they notice within the company’s security system so it may be patched before they're being exploited by malicious sources.

Many fortune 50 companies like Facebook,Twitter, Microsoft, and Google also use white-hat hackers.They also run bounty programs for vulnerabilities to be found and pay handsomely to their finders.

Grey Hat Hackers

Grey hats exploit networks and information systems within the manner that black hats do, however they do so without any type of malicious intent, revealing all loopholes and vulnerabilities to enforcement agencies or intelligence agencies.

A gray-hat hacker lies somewhere between black hat and white hat. A gray hat usually don't work for their own personal gain or to cause harm, but they may technically commit cyber crimes and do arguably unethical things.

Usually, grey-hat hackers surf internet and hack into computer systems to give notice to the administrator or the owner that their system/network contains one or many unknown vulnerabilities that has to be rectified at once. gray hats may extort the hacked, giving to correct the defect for a nominal fee.

References:

  • https://www.atlasobscura.com/articles/the-counterintuitive-history-of-black-hats-white-hats-and-villains
  • https://blog.tcitechs.com/blog/black-gray-white-hat-hackers
  • https://securityskeptic.typepad.com/the-security-skeptic/security-hats-black-and-white-no-grayscale.html
  • https://www.youtube.com/watch?v=h0ofT4O67A8

Related Solutions

Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from...
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from the professional, ethical hacker. In your answer state the extent to which ethical hackers might be the same as or different to white hat hackers. present an introduction (or background) about the case study ; include at least two ethical theories to support your answer (2 x 5 marks); Include examples of professional Codes of Ethics to support your answer ; present a conclusion...
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from...
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from the professional, ethical hacker. In your answer state the extent to which ethical hackers might be the same as or different to white hat hackers.
Many taxpayers think the tax law is all black and white with no room for gray...
Many taxpayers think the tax law is all black and white with no room for gray areas. What do you think? Explain your answer. Additionally, various tax services provide Internal Revenue Code (IRC) histories for researchers who need them. What value would this provide to researchers? Why would tax preparers need to review prior tax years' laws? Is this related to the perception of gray areas in tax law? Explain your answer in detail.
A hat contains a number of cubes: 3 red, 2 white, 1 blue, and 4 black....
A hat contains a number of cubes: 3 red, 2 white, 1 blue, and 4 black. If one cube is chosen at random, what is the probability that it is: A red cube? (3 points) Not a red cube? (3 points) A cube that is white OR black? (4 points) A cube that is neither white nor black? (4 points) What do the answers to part a and part b add up to and why? (5 points) If three cubes...
Twelve marbles are placed in a hat, three are black, two blue, one green, four white...
Twelve marbles are placed in a hat, three are black, two blue, one green, four white and two red. Two marbles are drawn out at random, without replacement. Find the probability that (a). Both marbles are black. (b).one of them is red, and the other is green.    (c). Neither marble is white.
Suppose I a black hat hacker. Can you think of a way to that I can...
Suppose I a black hat hacker. Can you think of a way to that I can figure out the secret key that Alice and Bob are calculating. Suppose that I know how the algorithm works as well as the values used for p and g.
In at least 200+ respond to the following (please include any references used) Companies face pricing...
In at least 200+ respond to the following (please include any references used) Companies face pricing decisions on an almost daily basis and while the market itself through the equilibrium point tends to set the market price, companies have some maneuverability within that market price (it is really more of a market price range, so to speak). However, changing their price will have consequences on the quantity demanded known as the price elasticity. How do companies determine how elastic (or...
********I NEED THE BELL SHAPED CURVE, PLEASE DON'T ANSWER IF YOU CAN'T INCLUDE*********** ********I NEED THE...
********I NEED THE BELL SHAPED CURVE, PLEASE DON'T ANSWER IF YOU CAN'T INCLUDE*********** ********I NEED THE BELL SHAPED CURVE, PLEASE DON'T ANSWER IF YOU CAN'T INCLUDE*********** ********I NEED THE BELL SHAPED CURVE, PLEASE DON'T ANSWER IF YOU CAN'T INCLUDE*********** ********I NEED THE BELL SHAPED CURVE, PLEASE DON'T ANSWER IF YOU CAN'T INCLUDE*********** According to the Organization for Economic Co-Operation and Development (OECD), adults in the United States worked an average of 1,805 hours in 2007. Assume the population standard deviation...
I NEED THIS CODE FOR C++ USING MONITORS PLEASE #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include...
I NEED THIS CODE FOR C++ USING MONITORS PLEASE #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <pthread.h> #define THREADS 10 // Number of Thread //bridge declared with array of character and integer value void Bridge(char array[], int value); // Global Variable int North = 1; //For North Number int South = 1; //For South Number pthread_mutex_t mutex1 = PTHREAD_MUTEX_INITIALIZER; // Setting Up MUTEX for lock //Thread for North farmer void NorthFarmer(){ pthread_mutex_lock(&mutex1); char array[5] = "North"; // North printf("%s Tunbridge...
Write a paper on international loan contract need abstract key words and references very important
Write a paper on international loan contract need abstract key words and references very important
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT