Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
612 views5 pages

Types of Hacking Explained

This document discusses four types of hacking: 1) Black hat hacking involves illegally breaking into secure networks to steal or damage data for personal gain. Black hat hackers are commonly known as "crackers". 2) White hat hacking, also known as ethical hacking, involves penetrating systems to test security without malicious intent. White hat hackers work for organizations to improve security. 3) Gray hat hacking falls between black hat and white hat hacking, as it does not necessarily involve criminal plans but may unintentionally cause damage. Gray hat hackers disclose vulnerabilities publicly rather than directly informing companies. 4) Blue hat hacking involves individuals indirectly working for companies by debugging software and returning findings, to help identify bugs before public

Uploaded by

Lav Vijayvargiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
612 views5 pages

Types of Hacking Explained

This document discusses four types of hacking: 1) Black hat hacking involves illegally breaking into secure networks to steal or damage data for personal gain. Black hat hackers are commonly known as "crackers". 2) White hat hacking, also known as ethical hacking, involves penetrating systems to test security without malicious intent. White hat hackers work for organizations to improve security. 3) Gray hat hacking falls between black hat and white hat hacking, as it does not necessarily involve criminal plans but may unintentionally cause damage. Gray hat hackers disclose vulnerabilities publicly rather than directly informing companies. 4) Blue hat hacking involves individuals indirectly working for companies by debugging software and returning findings, to help identify bugs before public

Uploaded by

Lav Vijayvargiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

TYPES OF HACKING
1.1

BLACK HAT HACKING:

Black hat hacking is the type of hacking in which the hacker violates
computer security for personal benefits and transferring malicious
data. Black hat hackers form the stereotypical, illegal hacking groups
often portrayed in popular culture, and are "the epitome of all that the

Fig: Black Hat Hacking

Public fears in a computer criminal". Black hat hacking basically


involves breaking into secure network centers and hubs in order to
intentionally destroy copy and steal data. Black hat hackers are
commonly termed as crackers.
1.1.1) SCOPE OF using BLACK HAT HACKING:

Crackers usually keep track of the vulnerabilities to the system and


try to find a path to invade into the network. Privacy and freedom are
often not kept secure in black hat hacking. Once they have gained
control over a system, they may apply patches or fixes to the system

only to keep their reigning control. This type of hacking is almost


opposite in sense to the white hat hacking.
This is actually the most talked about type of hacking currently. Black
hat hackers do not work for organizations. They may work individually
or in small groups. Cases of hacking, extorting and then threatening
are all related to black hat hacking.
1.2

WHITE HAT HACKING aka ETHICAL HACKING:

In white hat hacking the hacker breaks security and corrupts systems
for non malicious and non beneficial
reasons, which in turn may be manifolds.
This might be done in order to test
security systems for some legal
employers or to test upon some security
servers. Basically a white hat hacker is
an Ethical Hacker. The EC-Council, also
known as The Council of Electronic
Commerce and Consultants, has made
many courses tutorials and certifications
Fig: White Hat Hacking

available for those who are interested on learning the art of Ethical
Hacking.

1.2.1) SCOPE OF using WHITE HAT HACKING:

Basically white hat hacking is used to undo the damage that has
been done and to prevent any further potential damages from
happening on networks and servers because of cyber criminals and
Black Hat Hackers.
Generally white hat hackers are employed in companies to protect
plagiarism and corruption of data and preventing the same from going
into wrong hands.

1.3

GRAY HAT HACKING:

Gray hat hacking lies somewhere in between black hat and white hat
hacking. It does not involve intentional criminal activities and
corruption of systems for personal gains. But there might be
instances that the hacker may unknowingly cause damage to
networks and servers.

Fig: Gray Hat Hacking

1.3.1) SCOPE OF using GRAY HAT HACKING:

Gray hat hackers do not work for organizations. For instance, in case
they find a loophole in some security networks they do not privately
inform the concerned organization about the same. Instead they
disclose the fact publicly. This still leaves an opportunity for the
company to repair upon the faults in security, but may leave the
network vulnerable to the hands of black hat hackers.

1.4

BLUE HAT HACKING :

Blue hat hacking involves personnel who are not actually employed in
a company but work indirectly for the same. As soon as the big
companies launch a new product in the e-market they try to fix all the

Fig: Blue Hat Hacking

bugs in the software for better performance and attracting more


users.

1.4.1) SCOPE OF using BLUE HAT HACKING:

Blue hat hackers are hired for the same task of debugging the
software and return the same back to the company. Microsoft, Apple
etc. are some of the brands that take help of debuggers.
So, blue hat hacking increases opportunities of working at home for
multinational companies and being paid heftily for the simple work of

coding. This further increases job prospects and knowledge about


software functioning.

You might also like