Hackers are categorized according to their intent and the prior approval of the organizations whose networks they're hacking. What are some of these categories?

What will be an ideal response?


ANSWER: Hackers may be categorized as follows:
* white hat hacker-These IT security experts are hired by organizations to assess their security and risks. They're sometimes called ethical hackers. Their goal is to identify security vulnerabilities of all kinds so the organization can make changes to increase their security. The extent of their efforts is usually clearly defined in a written contract before they begin their testing, and their activities are limited by existing laws and restrictions. At no point is private data compromised outside of that trusted relationship.
* black hat hacker-These groups or individuals use their skills to bypass security systems to cause damage, steal data, or compromise privacy. They're not concerned with legal restrictions, and are intent on achieving personal gain or executing a personal agenda against an individual or an organization. Some black hat hackers and groups are also available for hire to serve someone else's agenda.
* gray hat hacker-These hackers abide by a code of ethics all their own. Although they might engage in illegal activity, their intent is to educate and assist. For example, a computer hobbyist who hacks a local business's weak Wi-Fi password, and then reports that weakness to the business owners without damaging or stealing the company's data, has engaged in gray hat hacking. Gray hats are vulnerable to legal prosecution, and therefore often go to a great deal of effort to remain anonymous.

Computer Science & Information Technology

You might also like to view...

Briefly describe the three main types of software maintenance. Why is it sometimes difficult to distinguish between them?

What will be an ideal response?

Computer Science & Information Technology

SharePoint Server 2013 includes the same applications as SharePoint Designer 2013

Indicate whether the statement is true or false

Computer Science & Information Technology

Detail data is typically ________ to and either above or to the left of the summary data within subtotaled rows that are totaled and summarized

A) opposite B) adjacent C) juxtaposed D) related

Computer Science & Information Technology

What does pink highlight on text mean?

What will be an ideal response?

Computer Science & Information Technology