Академический Документы
Профессиональный Документы
Культура Документы
TYPES OF HACKING
1.1
Black hat hacking is the type of hacking in which the hacker violates
computer security for personal benefits and transferring malicious
data. Black hat hackers form the stereotypical, illegal hacking groups
often portrayed in popular culture, and are "the epitome of all that the
In white hat hacking the hacker breaks security and corrupts systems
for non malicious and non beneficial
reasons, which in turn may be manifolds.
This might be done in order to test
security systems for some legal
employers or to test upon some security
servers. Basically a white hat hacker is
an Ethical Hacker. The EC-Council, also
known as The Council of Electronic
Commerce and Consultants, has made
many courses tutorials and certifications
Fig: White Hat Hacking
available for those who are interested on learning the art of Ethical
Hacking.
Basically white hat hacking is used to undo the damage that has
been done and to prevent any further potential damages from
happening on networks and servers because of cyber criminals and
Black Hat Hackers.
Generally white hat hackers are employed in companies to protect
plagiarism and corruption of data and preventing the same from going
into wrong hands.
1.3
Gray hat hacking lies somewhere in between black hat and white hat
hacking. It does not involve intentional criminal activities and
corruption of systems for personal gains. But there might be
instances that the hacker may unknowingly cause damage to
networks and servers.
Gray hat hackers do not work for organizations. For instance, in case
they find a loophole in some security networks they do not privately
inform the concerned organization about the same. Instead they
disclose the fact publicly. This still leaves an opportunity for the
company to repair upon the faults in security, but may leave the
network vulnerable to the hands of black hat hackers.
1.4
Blue hat hacking involves personnel who are not actually employed in
a company but work indirectly for the same. As soon as the big
companies launch a new product in the e-market they try to fix all the
Blue hat hackers are hired for the same task of debugging the
software and return the same back to the company. Microsoft, Apple
etc. are some of the brands that take help of debuggers.
So, blue hat hacking increases opportunities of working at home for
multinational companies and being paid heftily for the simple work of