FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A hacker learns of a vulnerability regarding a specific piece of software, but they do not tell the vendor and instead sell it to the highest bidder since there will not be a patch until attacks become common.
A
Bidder
B
Broker
C
Seller
D
Attacker
Explanation: 

Detailed explanation-1: -Gray hat hackers often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

Detailed explanation-2: -Ethical hackers are hired by organizations to look into the vulnerabilities of their systems and networks and develop solutions to prevent data breaches.

Detailed explanation-3: -Blue hat hackers are hired by organizations to bug-test a new software or system network before it’s released. Their role is to find loopholes or security vulnerabilities in the new software and remedy them before it launches. Motives: To identify vulnerabilities in new organizational software before it’s released.

Detailed explanation-4: -A white hat hacker or ethical hacker is invited by organizations to help them hack themselves, so to speak, identify security gaps before black hat hackers do, and remediate them.

There is 1 question to complete.