White, Black, and Grey Hat Hackers

 White, Black, and Grey Hat Hackers


Malicious online activities have become a usual part of our life. Hackers identify the weaknesses and find out methods to gain access to a system. With the use of bugs and viruses, they can easily enter and exploit the system and manipulate it the way they want it to function for their personal gains. But that doesn’t mean that all the hacker's intentions are bad, some are for the benefit of the company only. To simplify things a bit more, there are 3 types of hackers:



  1. White Hat Hackers

  Many companies and government agencies actually employ hackers to help them secure their systems as they use their intelligence for the good. They are paid by the company for keeping the data of the company intact through penetration testing and continuously monitoring the system to find any threats. They usually do it with the permission of the owners and have extensive training and R&D teams to facilitate their work.


  1. Black Hat Hackers

These types of hackers are the most dangerous ones as they use the data for their personal gains through the use of malware. They try to gain unauthorized entry into the system without the permission of the owners. Their main agenda is to steal financial information, password, or confidential information through which they can torture the owners of that data. The expert hackers can also manipulate the data the way they want.

  1. Grey Hat Hackers

A mix of the above two, they are a potential threat to the system as they are on the lookout for vulnerabilities and when found get reported to the owner. If the owner will pay the hacker for finding that issue with the system and fixing it, it’s all good. But if the opposite takes place, they will circulate the important data of the system to the whole world. Mostly, their intention is not to exploit and they could also let it go but it’s still illegal as it was done without the permission of the owners.

person in black hoodie wearing white mask


The term hacker often brings up a lot of negative connotations. It isn’t inherently bad or illegal unless the hacker is working to compromise a computer system without the owner’s permission to do so. Some are good and some are bad, which can be differentiated by seeing their motives. Lots of movies and tv shows like Mr. Robot have been made to portray this and we as individuals should also keep in check if our system antivirus is up to date or not. Try not to click any link which seems suspicious because it can lead to hackers having an access to your system.





Article by: Nidhi Singh

Edited by: Aastha Soni






Comments

Popular posts from this blog

MAGIC OF MAHARASHTRA

Gondola in Venice

CN Tower