Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tech Term: Hacker

Tech Term: Hacker

The term “hacker” is possibly one of the best-known technology-related terms there is, thanks to popular culture. Properties like The Girl with the Dragon Tattoo and the Die Hard franchise have given the layman a distinct impression of what a hacker is. Unfortunately, this impression isn’t always accurate. Here, we’ll discuss what real-life hackers are like, and the different varieties there are.

Defining Hackers
In broad terms, a hacker is an individual that uses their computing and programming skills, sometimes cooperatively with others like them, to identify and exploit gaps in the protocols that protect computer systems. Their actions after that point can be used to classify them further.

There are three main classifications, with subtypes to specify different types of hackers more specifically.

The Types of Hackers
Black Hat
Black hat hackers are the first kind that you probably think about, as they are the bad guys of the hacking spectrum. They are the ones who use their computer skills to entrap their victims and steal information for their own benefit, largely contributing to the public perception of hackers as a whole. If someone is a black hat hacker, their work is motivated by personal gains, tends to take effect at the expense of others, and is illegal.

White Hat
White hat hackers fall on the opposite side of the hacking spectrum, electing to use their skills to help businesses and other organizations keep their IT systems secure by seeking out weak points and vulnerabilities so that steps can be taken to fix these problems. White hat hackers also only operate by request - they will not hack your systems unless you ask them to try. In a way, if Symmetric Engineering Group were to run a penetration test on your business, we would be operating as white hat hackers.

Gray Hat
As their name would suggest, gray hat hackers are a combination of black hat and white hat. While they avoid being classified as black hat by not personally profiting from a hack, they also aren’t white hat, as their hacks aren’t done with the permission (or knowledge) of their target. The vulnerabilities they find will sometimes be reported to the hacked organization or distributed online for others to take advantage of.

Hacker Subtypes
Script Kiddies
These are the amateurs, the hackers that rely on pre-written code to launch basic attacks on their targets. Their motivation is often to attract attention or to impress others, with no appreciation for why the codes they leverage work and no desire to learn.

Blue Hat
Similar to a script kiddie, a blue hat hacker is an amateur who uses the code written by others to lash out against those who have wronged them in their eyes. Again, like a script kiddie, a blue hat hacker has no desire to learn how hacking works, they just want to use it as a means to a vengeful end.

Red Hat
A red hat hacker is a hacker that targets other hackers. Rather than reporting a discovered attack, as a white hat hacker would, a red hat hacker will instead attack back. With the goal of preventing black hat hackers from being able to hack, red hats will use cyberattacks and malware to take them out of commission.

Green Hat
The greenhorns of the hacking world, green hats are script kiddies who actually want to learn and improve. Always ready to ask questions of more experienced hackers and to learn all they can, green hat hackers are the ones who grow to be more skilled in the future.

State-Sponsored
These hackers are employed by a governing body to serve the state, stealing valuable information and targeting the enemies of a nation. These hackers have been known to strike out against key individuals and companies, as well as the opposing nation as a whole. Their status as a government agent provides them with considerable support and resources.

Hacktivist
Again, acting either as an individual or as a part of a group, hacktivists leverage their abilities to act upon a deeply-held conviction. By putting their skills to use, hacktivists are able to damage entities who hold beliefs counter to their own, whether that entity is a business or a governing body. As one might image, their driving motivation is to encourage (or “encourage”) social change.

Whistleblower/Malicious Insider
Instead of relying on hacking skills or borrowed codes, these hackers are those that use their status as an employee to gain access to a company’s confidential, invaluable data. Some act to appease a grudge they have fostered against their employer, while others are moles for one of the company’s rivals. Either way, these hackers are some of the most dangerous to the company, as their threats are the ones that usually aren’t seen coming.

Hackers Switching Hats
Complicating matters somewhat, a hacker’s hat isn’t forever. Many hackers have moved from the realm of black hat to gray. Samy Kamkar gained enough notoriety to earn a lifetime ban from the Internet after crashing MySpace with a worm at the tender age of 19 in 2005. However, his sentence was lifted after three years of good behavior. Today, Kamkar wears a gray hat, identifying vulnerabilities independently and reporting them to those who need to know.

However, the opposite case is equally possible, and shows that these considerations can be complicated. For example, In May 2017, Marcus Hutchins (AKA “MalwareTech”) was responsible for putting a stop to WannaCry but was arrested in August 2017 for allegedly writing and distributing the Kronos banking Trojan, potentially trading a white hat for a gray hat.

There are others, too. MIT professor Robert Morris created the first ever computer worm during his graduate studies at Cornell University, and was the first to be convicted under the Computer Fraud and Abuse Act as a result. A one-time member of the LulzSec Group that hacked the CIA and Sony, Mustafa Al-Bassam now works as a security adviser.

At the end of the day, hackers are more than just a black and white topic, and the lines get more and more blurred every day. What do you think? Is “hacker” a pejorative term, or is it more complicated than just that? Share your thoughts in the comments!

Smaller Practices are Choosing Cloud-Based EHR
Here Are Some VoIP Features That May Surprise You
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Managed IT Services Technology Cloud Business Computing Email Privacy IT Infrastructure Management Malware Business Continuity Hackers IT Companies in Tampa Hosted Solutions Internet Business Business Mobility IT Support Services Data Backup Business IT Solutions Microsoft I.T. Management Software Data Outsourced IT Managed Service Provider Productivity IT Professional Services Custom Business Solutions Network Security Computer Mobile Devices IT Business Solutions Tech Term Business Applications Productivity IT Management Ransomware Data Recovery Technology Consultants Android Innovation Windows 10 Managed IT Service in Florida Managed IT Service Business IT Support Managed IT Internet of Things Windows Disaster Recovery Cloud Computing Managed Services in Florida I.T. Support Google User Tips Communication Browser Backup Workplace Tips I.T. Services Dynamic Solutions IT Support Services in Tampa IT Risk Management IT Support IT Services in Florida Data Management Collaboration Encryption Smartphone Hardware Remote Monitoring IT Outsourcing in Tampa IT Support in Tampa Managed Services Artificial Intelligence Server Gmail Network IT Service Small Business IT Managed Services Mobile Device Cybersecurity Smartphones Save Money Managed Services in Tampa Bay Holiday Microsoft Office Upgrade Phishing Business Management Efficiency BYOD App Social Media Office 365 Paperless Office Firewall Customer Relationship Management Mobile Device Management Tampa IT Support Bandwidth Vendor Management VoIP Tech Companies in Tampa BDR Passwords Applications Unified Threat Management Website IT Services in Tampa Project Management Bring Your Own Device Vulnerability Content Filtering IT Outsourcing Business IT Support Services Managed IT Services Apple Small Business IT Solutions Facebook Windows 10 Infrastructure Managed Service in Tampa Risk Management Computer Networking Tip of the week IT Outsourcing in Florida Antivirus Government Wi-Fi Chrome Operating System IT Service Management Data Computer Services IT Company Business Plan Word Two-factor Authentication Compliance IT Vendor Management Data storage IT solutions Unified Communications Storage Regulations Help Desk Miscellaneous IT Management Services Settings Telephone Systems Big Data Maintenance IT Company Data Security The Internet of Things Saving Money Remote Computing Robot Wireless Healthcare Money Router Computer Hardware Repair Wireless Technology SaaS Analytics Mobile Computing Employer-Employee Relationship Retail WiFi Customer Service Managed Service Hosted Solution Document Management Automation Office communications Data loss Scam Internet Exlporer Virtualization Network Management Monitors Users Spam Budget User Error Files Tablet Alert Apps IT Consulting Mobile Security Virtual Private Network Solid State Drive Managed IT Outsourcing Assessment IT Support Helpdesk LiFi Smart Technology Recovery IT Companies in Florida Business Continuity Services Presentation Business Technology Virtual Reality Politics Network Congestion Information Technology Mobility Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality Remote Monitoring and Management Blockchain VPN IT Management Service IBM Laptop Remote Workers Administration Google Drive Uninterrupted Power Supply Quick Tips End of Support Computer Support Machine Learning Computer Network Services Mouse Licensing Information Training I.T. Company Business Application Computer Networking Services Outlook Redundancy Virtual Desktop Flexibility Patch Management Office Tips IoT Net Neutrality How To YouTube HIPAA File Sharing Computing Digital Payment Server Management Search Sync Business Growth Asset Tracking Competition Data Technology Scary Stories Server Hosting IT Tech Support Hacks Application Company Culture Best Practice Conferencing Identity Theft Comparison IT Vendor Management in Tampa Identities Data Warehousing Recycling Cyberattacks Computer Care Firefox Microsoft Affiliate Program SharePoint IT Technicians IT Support and Solutions Backups Digital Signature MSP Hard Drives Technology Tips Nanotechnology Managed Service Providers Bitcoin Star Wars Consulting Public Speaking VoIP Data Breach Cooperation Managed Services in Floirda Google Wallet Intranet Disaster Development Avoiding Downtime Zero-Day Threat Statistics Network Support in Florida Mobile Device Managment Business Continuity Service Providers OneNote Writing Sports Computer Repair Networking Technology Consulting Firms Current Events Managing Stress Heating/Cooling Instant Messaging Touchscreen Server Hosting in Florida Specifications Social Networking Proactive Cabling Microsoft Excel USB eWaste Read Only Microsoft Business Solutions Safety Marketing Downloads Mirgation IT Managed Service in Tampa Information Technology Consulting Legal Cortana Screen Reader Tech Company in Tampa Meetings Windows 8 Professional Service Utility Computing Programming Managed Services Provider Digital Dark Data Technology Laws Staff IT Company in Tampa Websites Drones Gadgets Cables Backup and Disaster Recovery Google Maps Bluetooth Motherboard Employee-Employer Relationship Social Engineering Hotspot Going Green Enterprise Content Management Finance Tampa IT Services Education Black Friday Cost Management Mail Merge Careers Alt Codes Top IT Outsourcing Company Management Consultation Multi-Factor Security Migration Help Desk Support in Tampa IT Consulting Services Health Care IT Services Knowledge Distributed Denial of Service Smart Tech IT Managed Service Provider Tech Support E-Commerce Spyware Consulting Services Unified Threat Management Operations Managed Service in Florida Wires Human Error Cyber Monday G Suite IT Consulting Service Health Corporate Profile Buisness Techology Language Printing Vulnerabilities Authentication Outsourced Computer Support Fun WPA3 Address IT Service in Tampa Jobs Typing Lenovo Permissions Server Hosting in Tampa Enterprise Resource Planning Password Bookmarks Google Calendar Chatbots Help Desk Support Automobile Shortcut Computers Business IT Solutions Experience Deep Learning Break Fix Connectivity Point of Sale Hard Drive Features Service IT Hacker Downtime Printer Wearable Technology Hacking Permission Modem WannaCry Trending Disaster Resistance Computing Infrastructure Geography Authorization Servers Google Docs Fleet Tracking Undo Hard Disk Drive Halloween Superfish Fraud Social Mobile Favorites Time Management Co-managed IT Legislation Identity Software Tips Display Full Service IT Dark Web Samsung Healthcare IT Cache Electronic Health Records IT Solutions for Small Business Access Control IT Support Companies in Tampa Save Time Test Software as a Service Cookies Managed it Services in Tampa Travel Cryptocurrency Humor Monitoring Domains CIO Proactive IT Alerts Chromebook History High-Speed Internet User Employees Law Enforcement RMM Notifications Unsupported Software Mobile Office Private Cloud Hiring/Firing Motion Sickness Cameras Physical Security Emergency Gadget IT Consultant Refrigeration Personal Information Lithium-ion Battery Staffing Mobile Data Error CCTV How To Cybercrime Crowdsourcing Printers GPS Public Cloud Twitter Webcam Taxes Upgrades Botnet Thank You Telephony Supercomputer Saving Time Running Cable I.T. Managament Tracking Processors CrashOverride 3D Printing Emoji Congratulations Black Market Update Virus IT Budget Electronic Medical Records Managed Servers Work/Life Balance 5G Business Appplications Administrator Web Server Cleaning IP Address Relocation Regulation

Latest Blog Entry

Wireless Internet access for a user’s devices isn’t just a luxury these days--it’s expected. If the Wi-Fi drops out for any reason at all, chaos strikes, rendering any ability to stream content or access the Internet a moot point. This is particularly the case for businesses...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login