FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Hacker who breaks into a network then discloses the vulnerabilities in order to force the company into fixing issues, but they are not out for personal gain?
A
Blue Hat
B
Black Hat
C
Grey Hat
D
White Hat
Explanation: 

Detailed explanation-1: -Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

Detailed explanation-2: -White hat hackers probe cybersecurity weaknesses to help organizations develop stronger security; black hat hackers are motivated by malicious intent; and Gray hat hackers operate in the nebulous area in between-they’re not malicious, but they’re not always ethical either.

Detailed explanation-3: -Some (in)famous examples of grey hat hackers are: Anonymous (World famous hacktivist group) HD Moore (Creator of Metasploit) Adrian Lamo (aka the homeless hacker)

Detailed explanation-4: -Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization’s systems and data.

Detailed explanation-5: -Also known as ethical hackers, white hats disclose all vulnerabilities to their employer. White hats will also disclose the vulnerability to the vendor whose hardware or software is affected so it may patch other customers’ systems. White hat hacking techniques include penetration testing and vulnerability assessments.

There is 1 question to complete.