The assignment content discusses computer hackers, their types (black hat, white hat, and grey hat), and the motives behind hacking. It also touches on how hackers can access a computer and various password cracking techniques used by hackers. The content concludes with a discussion on when hacking is considered legal or illegal.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: Blog Writing
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Running head: Blog Writing COMPUTER HACKERS July, 29th2019 INTRODUCTION TO THE COMPUTER HACKERS The developments in the information and communication technology have provided ease of performing business to the organization. However, developments in the given sector have led to developing different other types of issues. Hence, one of the common issue that is associated with cybercrime is hacking. In accordance with the given context, it can be said that hacking is being regarded as the activity of using computers with an aim to perform different types of crimes. The individual who used to perform such crimes is called by the name of hackers. Thus, it can be said that hackers are the individual who has the ability to find fault or the issue in the computer system or the network. Thus, it is through this way only they tend to get an entry in the system of other people and use their data for their own benefit. In this study, detail analysis will be carried out on computer hackers. TYPES OF HACKERS At first, discussion will be carried out on the types of hackers. Herein, it can be depicted that there are basically three main types of hackers and the details about them are given below: Black hat hacker The very first type of hacker is being called by the name of a black hat hacker. It is being regarded as the type of hackers who tends to hack the computers for malicious intent. Such types of individual are being considered as the bad guy. Herein, it can be said that the respective type of individual uses his hacking skill with an aim to steal the data or the money. On the other hand, such type of hackers loves their work very much and they like to come in the news because of their bad habit. For example, black hat hackers sometimes change the font color of the company’s website. In addition to this, they also try to break the computer system and will try to get the credit card information of the individual in an effectual manner. Hence, respective hackers are being considered as very much dangerous for the company. They also carried out their efforts outside the company’s laws and regulations. 1
Running head: Blog Writing White hat hackers The White hat hackers are basically the computer system specialist who basically breaks the protected system and the network in order to test the as well as assess their security. They use their skills with an aim to see improve the security of the system. In accordance with the given context, they basically get the data regarding different vulnerabilities that could pose harm to the computer system and could break the security of the network. Hence, it is very right to say that they are being proved as a very helpful individual for the companies. This is due to the reason that they basically give a description of the problems that could harm the system of the firm. Hence, it is through this way only firms can find out some protective measures with an aim to protect their data from the ineffective individuals or the black hat hackers. Further, it can also be said that they are also synonyms with the ethical hackers and thus they tend to play a vital role in introducing different strategies that could help in removing all the malicious attack related problem of the company in an effectual manner. Grey hat hackers The last type of hacker is called by the name of grey hat hackers. It is also referred to as the computer security expert who sometimes violates the ethical standard as well as law, but it does not possess any kind of malicious intent just like the black hat hackers does. Additionally, it can also be said that grey hat hackers will basically engage itself in the type of practices which seems less than above any kind of board. However, it often performs its function for the common good in an effectual manner. In other words, it can also be depicted that grey hat hackers basically represent the middle ground between white and black hat hackers. The grey hat hackers also play a significant role in the security environment. The grey hat hackers will explore the vulnerability in the security and thus it will tend to give information about the same to the public and thus make them aware of the existence of vulnerabilities. Here, it will also give them guidance about the actions that they can perform with an aim to protect themselves from any kind of cyber attacks from the side of black hat hackers. 2
Running head: Blog Writing MOTIVE BEHIND HACKING200 HOWHACKERSCANACCESSINTHECOMPUTEROF INDIVIDUAL500 TYPESOFPASSWORDCRACKINGTECHNIQUESUSEDBY HACKERS500 WHEN HACKING IS CONSIDER AS LEGAL AND ILLEGAL400 CONCLUSION100 3