COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Blue Hat
|
|
Black Hat
|
|
Grey Hat
|
|
White Hat
|
Detailed explanation-1: -Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.
Detailed explanation-2: -White hat hackers probe cybersecurity weaknesses to help organizations develop stronger security; black hat hackers are motivated by malicious intent; and Gray hat hackers operate in the nebulous area in between-they’re not malicious, but they’re not always ethical either.
Detailed explanation-3: -Some (in)famous examples of grey hat hackers are: Anonymous (World famous hacktivist group) HD Moore (Creator of Metasploit) Adrian Lamo (aka the homeless hacker)
Detailed explanation-4: -Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization’s systems and data.
Detailed explanation-5: -Also known as ethical hackers, white hats disclose all vulnerabilities to their employer. White hats will also disclose the vulnerability to the vendor whose hardware or software is affected so it may patch other customers’ systems. White hat hacking techniques include penetration testing and vulnerability assessments.