COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is meant by the term ‘Grey Hat Hacker’
A
Illegal hacker-intent on doing harm
B
Doesn’t steal but may access without permission
C
paid by companies to test their systems fro vulnerabilities.
D
None of the above
Explanation: 

Detailed explanation-1: -Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.

Detailed explanation-2: -Some (in)famous examples of grey hat hackers are: Anonymous (World famous hacktivist group) HD Moore (Creator of Metasploit) Adrian Lamo (aka the homeless hacker)

Detailed explanation-3: -White hat hackers probe cybersecurity weaknesses to help organizations develop stronger security; black hat hackers are motivated by malicious intent; and Gray hat hackers operate in the nebulous area in between-they’re not malicious, but they’re not always ethical either.

Detailed explanation-4: -Red Hat Hackers versus Grey Hat Hackers Grey hats typically charge users to fix bugs, strengthen their security defenses, and provide vulnerability patches. In a sense, that’s their primary difference from red hats, who don’t usually get paid for what they do. Both may be after fame, though.

Detailed explanation-5: -Grey Hat Hacking (The in-the-middle kind) These hackers are neither motivated by malicious intent, nor are they formally employed and authorized to conduct hacking activities. Gray Hat hackers typically don’t cause damages to a victim-they discover vulnerabilities that can potentially cause damages.

There is 1 question to complete.