Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tech Term: Hacker

Tech Term: Hacker

The term “hacker” is possibly one of the best-known technology-related terms there is, thanks to popular culture. Properties like The Girl with the Dragon Tattoo and the Die Hard franchise have given the layman a distinct impression of what a hacker is. Unfortunately, this impression isn’t always accurate. Here, we’ll discuss what real-life hackers are like, and the different varieties there are.

Defining Hackers
In broad terms, a hacker is an individual that uses their computing and programming skills, sometimes cooperatively with others like them, to identify and exploit gaps in the protocols that protect computer systems. Their actions after that point can be used to classify them further.

There are three main classifications, with subtypes to specify different types of hackers more specifically.

The Types of Hackers
Black Hat
Black hat hackers are the first kind that you probably think about, as they are the bad guys of the hacking spectrum. They are the ones who use their computer skills to entrap their victims and steal information for their own benefit, largely contributing to the public perception of hackers as a whole. If someone is a black hat hacker, their work is motivated by personal gains, tends to take effect at the expense of others, and is illegal.

White Hat
White hat hackers fall on the opposite side of the hacking spectrum, electing to use their skills to help businesses and other organizations keep their IT systems secure by seeking out weak points and vulnerabilities so that steps can be taken to fix these problems. White hat hackers also only operate by request - they will not hack your systems unless you ask them to try. In a way, if Symmetric Engineering Group were to run a penetration test on your business, we would be operating as white hat hackers.

Gray Hat
As their name would suggest, gray hat hackers are a combination of black hat and white hat. While they avoid being classified as black hat by not personally profiting from a hack, they also aren’t white hat, as their hacks aren’t done with the permission (or knowledge) of their target. The vulnerabilities they find will sometimes be reported to the hacked organization or distributed online for others to take advantage of.

Hacker Subtypes
Script Kiddies
These are the amateurs, the hackers that rely on pre-written code to launch basic attacks on their targets. Their motivation is often to attract attention or to impress others, with no appreciation for why the codes they leverage work and no desire to learn.

Blue Hat
Similar to a script kiddie, a blue hat hacker is an amateur who uses the code written by others to lash out against those who have wronged them in their eyes. Again, like a script kiddie, a blue hat hacker has no desire to learn how hacking works, they just want to use it as a means to a vengeful end.

Red Hat
A red hat hacker is a hacker that targets other hackers. Rather than reporting a discovered attack, as a white hat hacker would, a red hat hacker will instead attack back. With the goal of preventing black hat hackers from being able to hack, red hats will use cyberattacks and malware to take them out of commission.

Green Hat
The greenhorns of the hacking world, green hats are script kiddies who actually want to learn and improve. Always ready to ask questions of more experienced hackers and to learn all they can, green hat hackers are the ones who grow to be more skilled in the future.

State-Sponsored
These hackers are employed by a governing body to serve the state, stealing valuable information and targeting the enemies of a nation. These hackers have been known to strike out against key individuals and companies, as well as the opposing nation as a whole. Their status as a government agent provides them with considerable support and resources.

Hacktivist
Again, acting either as an individual or as a part of a group, hacktivists leverage their abilities to act upon a deeply-held conviction. By putting their skills to use, hacktivists are able to damage entities who hold beliefs counter to their own, whether that entity is a business or a governing body. As one might image, their driving motivation is to encourage (or “encourage”) social change.

Whistleblower/Malicious Insider
Instead of relying on hacking skills or borrowed codes, these hackers are those that use their status as an employee to gain access to a company’s confidential, invaluable data. Some act to appease a grudge they have fostered against their employer, while others are moles for one of the company’s rivals. Either way, these hackers are some of the most dangerous to the company, as their threats are the ones that usually aren’t seen coming.

Hackers Switching Hats
Complicating matters somewhat, a hacker’s hat isn’t forever. Many hackers have moved from the realm of black hat to gray. Samy Kamkar gained enough notoriety to earn a lifetime ban from the Internet after crashing MySpace with a worm at the tender age of 19 in 2005. However, his sentence was lifted after three years of good behavior. Today, Kamkar wears a gray hat, identifying vulnerabilities independently and reporting them to those who need to know.

However, the opposite case is equally possible, and shows that these considerations can be complicated. For example, In May 2017, Marcus Hutchins (AKA “MalwareTech”) was responsible for putting a stop to WannaCry but was arrested in August 2017 for allegedly writing and distributing the Kronos banking Trojan, potentially trading a white hat for a gray hat.

There are others, too. MIT professor Robert Morris created the first ever computer worm during his graduate studies at Cornell University, and was the first to be convicted under the Computer Fraud and Abuse Act as a result. A one-time member of the LulzSec Group that hacked the CIA and Sony, Mustafa Al-Bassam now works as a security adviser.

At the end of the day, hackers are more than just a black and white topic, and the lines get more and more blurred every day. What do you think? Is “hacker” a pejorative term, or is it more complicated than just that? Share your thoughts in the comments!

Smaller Practices are Choosing Cloud-Based EHR
Here Are Some VoIP Features That May Surprise You
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Technology Managed IT Services Business Computing Cloud Email Privacy Malware Hosted Solutions IT Infrastructure Management Hackers Business Continuity Internet IT Companies in Tampa Business Productivity IT Support Services Software Data Business Mobility Outsourced IT Data Backup Business IT Solutions Microsoft I.T. Management Network Security IT Professional Services Managed Service Provider Productivity Computer Custom Business Solutions Mobile Devices IT Management Tech Term IT Business Solutions Ransomware Business Applications Data Recovery Innovation Cloud Computing Google Technology Consultants Managed IT Service Hardware Business IT Support Managed IT User Tips Windows 10 Internet of Things Managed IT Service in Florida Android Windows Disaster Recovery I.T. Support Managed Services in Florida Small Business Communication Upgrade IT Support Services in Tampa IT Risk Management Collaboration Backup IT Support Workplace Tips Browser Efficiency Remote Monitoring Dynamic Solutions I.T. Services Business Management IT Outsourcing in Tampa Holiday IT Services in Florida Smartphones Smartphone Data Management Encryption Phishing IT Support in Tampa Paperless Office Server Microsoft Office Network Save Money Managed Services Artificial Intelligence Social Media IT Service Gmail Passwords BYOD Mobile Device Management App Mobile Device Office 365 IT Managed Services Cybersecurity Managed IT Services Managed Services in Tampa Bay Windows 10 Vendor Management VoIP Customer Relationship Management Unified Threat Management Website BDR Applications IT Services in Tampa communications Firewall Tampa IT Support Bandwidth Antivirus Operating System Employer-Employee Relationship Tech Companies in Tampa Bring Your Own Device Content Filtering Data Computer Services IT Service Management Information IT Company Business Plan Document Management Apple Word Two-factor Authentication IT Vendor Management Compliance IT Outsourcing Project Management Scam Vulnerability Business IT Support Services Small Business IT Solutions Facebook Risk Management Managed Service in Tampa Automation Computer Networking Infrastructure IT Outsourcing in Florida Healthcare Wi-Fi Chrome Tip of the week Government Quick Tips WiFi Customer Service Managed Service Hosted Solution Office IT solutions Data storage Data loss The Internet of Things Saving Money Remote Computing Unified Communications Storage Regulations Miscellaneous Tablet Apps Analytics Mobile Computing Help Desk IT Management Services Settings Telephone Systems Big Data IT Company Robot Wireless Maintenance Data Security Money Blockchain SaaS Computer Hardware Repair Wireless Technology Retail Router Downtime Machine Learning Computer Network Services Mouse Uninterrupted Power Supply Computer Support Training I.T. Company Business Application Licensing Social Virtual Desktop Flexibility Alert Computer Networking Services YouTube Office Tips Redundancy How To File Sharing Computing Access Control HIPAA Search Patch Management IoT Virtualization Employees Digital Payment Server Management Software as a Service Network Congestion Company Culture Users Network Management Monitors Internet Exlporer User Error Files Spam Budget IT Consulting Solid State Drive Managed IT Outsourcing Mobile Security Assessment Recovery IT Support Helpdesk LiFi Virtual Private Network Virtual Reality Politics Information Technology Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality IT Companies in Florida Business Continuity Services Smart Technology Presentation VPN IT Management Service Mobility Outlook Business Technology Management Laptop Remote Monitoring and Management Net Neutrality IBM Printing Administration End of Support Google Drive Remote Workers Service IT Enterprise Resource Planning Hacker Bookmarks Google Calendar Chatbots Hacking Computers Business IT Solutions WPA3 Experience Financial Deep Learning Address Point of Sale Notes Lenovo Permissions Intranet Printer Wearable Technology Permission Shortcut Break Fix Connectivity Hard Drive Features Trending Disaster Resistance Computing Infrastructure Geography Authorization Co-managed IT Servers Google Docs Modem Undo Electronic Medical Records Halloween WannaCry IT Solutions for Small Business Mobile Favorites Time Management IT Support Companies in Tampa Save Time Legislation Identity Display Full Service IT Fleet Tracking Procurement Hard Disk Drive USB Samsung PowerPoint Healthcare IT Superfish Fraud Chromebook History User Test Software Tips Managed it Services in Tampa Travel Cryptocurrency Humor Dark Web Domains Cache Electronic Health Records CIO IT Tech Support Hacks Proactive IT Alerts Best Practice High-Speed Internet IT Vendor Management in Tampa Sync Cookies Business Growth Competition Data Technology Monitoring Scary Stories Server Hosting Microsoft Affiliate Program Conferencing Identity Theft IT Support and Solutions Private Cloud Backups Comparison Digital Signature Hard Drives Asset Tracking Security Cameras Identities Professional Services Computer Care Firefox Managed Services in Floirda Google Wallet SharePoint IT Technicians Disaster Avoiding Downtime MSP RMM Managed Service Providers Bitcoin Data Warehousing Public Speaking Recycling Cyberattacks Technology Consulting Firms Current Events Data Breach Cooperation Heating/Cooling Server Hosting in Florida Development Zero-Day Threat Statistics Network Support in Florida Mobile Device Managment Business Continuity Service Providers Technology Tips Nanotechnology Writing Star Wars Consulting Sports Computer Repair VoIP Microsoft Business Solutions Managing Stress Safety Instant Messaging Marketing Touchscreen IT Managed Service in Tampa Information Technology Consulting Legal Specifications Social Networking OneNote Remote Worker Virtual Assistant Networking Read Only IT Company in Tampa Websites Drones Downloads Mirgation Gadgets Proactive Cortana Tech Terms Cabling Tech Company in Tampa Meetings Windows 8 Professional Service Microsoft Excel Programming Dark Data eWaste Going Green Technology Laws Staff Tampa IT Services Cables Backup and Disaster Recovery Education Google Maps Bluetooth Screen Reader Social Engineering Utility Computing Managed Services Provider Digital Enterprise Content Management Finance Help Desk Support in Tampa IT Consulting Services Black Friday Motherboard Cost Management Careers Employee-Employer Relationship ROI Alt Codes Wasting Time Top IT Outsourcing Company Hotspot Consultation Managed Service in Florida Multi-Factor Security Migration Health Care IT Services Knowledge Theft Mail Merge IT Managed Service Provider Tech Support Consulting Services Unified Threat Management Operations Outsourced Computer Support Wires Fun Human Error G Suite IT Consulting Service Distributed Denial of Service Smart Tech Health E-Commerce Buisness Spyware Language Password Vulnerabilities Authentication Help Desk Support Automobile Cyber Monday IT Service in Tampa Jobs Typing Corporate Profile Application Server Hosting in Tampa Techology 3D Printing Tracking Emoji Processors Update Black Market CrashOverride 5G IT Budget Business Appplications Administrator Managed Servers Work/Life Balance IP Address Relocation Lithium-ion Battery Web Server Cleaning Regulation Law Enforcement Unsupported Software Mobile Office Notifications Thank You Physical Security Hiring/Firing Motion Sickness Cameras Gadget Mobile Data Error IT Consultant Refrigeration Personal Information Emergency Staffing Congratulations How To CCTV Virus Public Cloud Cybercrime Crowdsourcing Printers GPS Botnet Twitter Webcam Upgrades Telephony Taxes Supercomputer Saving Time Running Cable I.T. Managament

Latest Blog Entry

You can’t have a successful business without a little bit of productivity. Unfortunately, some office environments can have a negative influence on the way your employees get their work done. Take a moment to ask yourself this question: “Are you simply busy, or are you actua...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login