Trusted by 2+ million users, 1000+ happy students everyday
Running head: Blog WritingBLOG WRITING
Running head: Blog WritingCOMPUTER HACKERSJuly, 29th 2019INTRODUCTION TO THE COMPUTER HACKERSThe developments in the information and communication technology have provided easeof performing business to the organization. However, developments in the given sector have ledto developing different other types of issues. Hence, one of the common issues that is associatedwith cybercrime is hacking. In accordance with the given context, it can be said that hacking isbeing regarded as the activity of using computers with an aim to perform different types ofcrimes. The individual who used to perform such crimes is called by the name of hackers.Thus, it can be said that hackers are the individual who has the ability to find fault or theissue in the computer system or the network. Thus, it is through this way only they tend to get anentry in the system of other people and use their data for their own benefit. In this study, detailanalysis will be carried out on computer hackers. TYPES OF HACKERSAt first, the discussion will be carried out on the types of hackers. Herein, it can bedepicted that there are basically three main types of hackers and the details about them are givenbelow:Black hat hackerThe very first type of hacker is being called by the name of a black hat hacker. It is beingregarded as the type of hackers who tends to hack the computers for malicious intent. Such typesof individual are being considered as the bad guy. Herein, it can be said that the respective typeof individual uses his hacking skill with an aim to steal the data or the money. On the other hand,such type of hackers loves their work very much and they like to come in the news because oftheir bad habit. For example, black hat hackers sometimes change the font color of thecompany’s website. In addition to this, they also try to break the computer system and will try toget the credit card information of the individual in an effectual manner. Hence, respectivehackers are being considered as very much dangerous for the company. They also carried outtheir efforts outside the company’s laws and regulations. 1
Running head: Blog WritingWhite hat hackersThe White hat hackers are basically the computer system specialist who basically breaksthe protected system and the network in order to test the as well as assess their security. They usetheir skills with an aim to see improve the security of the system. In accordance with the givencontext, they basically get the data regarding different vulnerabilities that could pose harm to thecomputer system and could break the security of the network. Hence, it is very right to say thatthey are being proved as a very helpful individual for the companies. This is due to the reasonthat they basically give a description of the problems that could harm the system of the firm.Hence, it is through this way only firms can find out some protective measures with an aim toprotect their data from the ineffective individuals or the black hat hackers. Further, it can also besaid that they are also synonyms with the ethical hackers and thus they tend to play a vital role inintroducing different strategies that could help in removing all the malicious attack relatedproblem of the company in an effectual manner. Grey hat hackersThe last type of hacker is called by the name of grey hat hackers. It is also referred to asthe computer security expert who sometimes violates the ethical standard as well as law, but itdoes not possess any kind of malicious intent just like the black hat hackers does. Additionally, itcan also be said that grey hat hackers will basically engage itself in the type of practices whichseems less than above any kind of board. However, it often performs its function for the commongood in an effectual manner. In other words, it can also be depicted that grey hat hackersbasically represent the middle ground between white and black hat hackers. The grey hat hackersalso play a significant role in the security environment. The grey hat hackers will explore thevulnerability in the security and thus it will tend to give information about the same to the publicand thus make them aware of the existence of vulnerabilities. Here, it will also give themguidance about the actions that they can perform with an aim to protect themselves from anykind of cyber attacks from the side of black hat hackers. MOTIVE BEHIND HACKINGTill now the major discussion is being carried out about the types of hackers and themeaning of the same. Now the discussion is being put forward towards the main motives behind2
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss