Hackers are categorized according to their intent and the prior approval of the organizations whose networks they're hacking. What are some of these categories?
What will be an ideal response?
ANSWER: Hackers may be categorized as follows:
* white hat hacker-These IT security experts are hired by organizations to assess their security and risks. They're sometimes called ethical hackers. Their goal is to identify security vulnerabilities of all kinds so the organization can make changes to increase their security. The extent of their efforts is usually clearly defined in a written contract before they begin their testing, and their activities are limited by existing laws and restrictions. At no point is private data compromised outside of that trusted relationship.
* black hat hacker-These groups or individuals use their skills to bypass security systems to cause damage, steal data, or compromise privacy. They're not concerned with legal restrictions, and are intent on achieving personal gain or executing a personal agenda against an individual or an organization. Some black hat hackers and groups are also available for hire to serve someone else's agenda.
* gray hat hacker-These hackers abide by a code of ethics all their own. Although they might engage in illegal activity, their intent is to educate and assist. For example, a computer hobbyist who hacks a local business's weak Wi-Fi password, and then reports that weakness to the business owners without damaging or stealing the company's data, has engaged in gray hat hacking. Gray hats are vulnerable to legal prosecution, and therefore often go to a great deal of effort to remain anonymous.
You might also like to view...
When choosing a chart ________, make sure it complements the chart data and is easy to read
Fill in the blank(s) with correct word
In a report, you can use the same types of controls, including labels, text boxes, charts, and calculated controls that are found in forms
Indicate whether the statement is true or false