Let’s Talk About Hackers

When we hear the term Hacker, it is natural that we automatically relate the term with the word Criminal. I am going to provide you with some insight on this term as well as the different types of Hacker’s. Most people are not aware that there are different types of Hacker’s. The term hacking is associated with the unauthorized access to a computer system and/or network. This form on intrusion falls under the umbrella of a criminal act. However, there are three types of Hackers. The three types of Hackers are the Black Hat Hacker, the Grey Hat Hacker, and the White Hacker. In order to determine the criminology of the Hacker’s actions, there are two specific elements to be considered. The first elemental factor is the Hacker’s motivation. The second elemental factor is the justification for the Hack.

The Black Hat Hacker is a crook that likes to work with malicious software to access computer systems and/or networks to do damage. The motivation behind that Black Hat Hacker is personal advantage and/or financial gain; espionage; or even just for an egotistical thrill. A Black Hat Hacker can be anyone. Black Hat Hackers can be as young as the Curious George high school student type or a Professionally trained Hacker. Regardless of the Black Hat Hackers attributes, the bottom line is, their motivation. The Black Hat Hacker’s purpose is to steal data.

White Hat Hacker is also known as the Ethical Hacker. This Hacker is paid to Hack. The white hacker can work for a private company or the government. Their main focus as the Security Specialist is to look for that company or agencies security weaknesses. The White Hat Hacker uses the same hacking techniques as the Black Hat Hacker. The difference between them is that the White Hacker’s methods are legal whereas the Black Hat Hacker methods are illegal and with malicious intent to commit crimes.

Grey Hat Hacker goes both ways. This Hacker type, I find remarkably interesting. The main reason? The Grey Hat Hacker is an individual who utilizes vigilante methods including Black Hat Hacker methods. They can be good with good intentions or they can be bad and motivated by personal gain. When necessary, the Grey Hat Hacker will expose information as if they are trying to help you. God forbid you don’t agree with a Grey Hat Hacker, you risk exploitation. For the most part, they are not malicious in nature, however if they offer to help you it is always for a fee. A Grey Hackers will access a computer or network without permission. What they do with the data they access is based on how they feel. Meaning, if it is with a Robin Hood complex, it is for a cause. If it is for personal gain as I previously stated, results in a criminal act. Bottom line, Grey Hat Hacker’s never hack without a cause good or bad.

Now we might want to ask ourselves should corporations and/or organization’s employ Hackers to help them implement and/or test security posture? Are they taking a risk by employing skilled Hacker’s and trusting them to access their data? Excellent question! Here is my answer, in case this question is in the back of your mind. Again, when we think about the word Hacking we think Criminal. I believe corporations should hire hackers to help implement, test, and improve their security posture. When I say yes to this, I don’t mean any type of Hacker. Companies should hire White Hat Hackers to assist them with improving their security. White Hat Hacker’s are also known as Ethical Hacker’s. What does that mean? A White Hat Hacker is bound by professional code conduct and ethics. When a White Hat Hacker is employed by a company and/or government organization, their responsibility to Hack the company’s systems so that they can uncover all the vulnerabilities and fix them. White Hat Hackers are computer security specialist not only hack into protected company or government agency systems to test their vulnerabilities, but they also are responsible for conducting assessments.  These assessments are used to uncover Black Hat Hackers. White Hat Hackers use the same methods as the Black Hat Hackers to cause breaches.

References: Aukta, S., Wathodkar, K., Egan, A., Bialek, A., Rose, D., Morris, C., . . . Robert. (2019, June 13). 10 Types of Hackers You Should Know About: White, Black, Gray Others. Retrieved from https://www.malwarefox.com/types-of-hackers/

References: 7 Types of Hackers You Should Know. (2018, September 5). Retrieved from https://www.cybrary.it/0p3n/types-of-hackers/

Join 59 other subscribers

One response to “Let’s Talk About Hackers”

  1. Eric Sollberger Avatar
    Eric Sollberger

    awesome knowledge of the different types of Hackers.

    Like

Leave a reply to Eric Sollberger Cancel reply