blog




  • Essay / The three hats of hackers - 1143

    The definition of hacking has undergone some changes in recent years. At first, he identified people “who like to modify and subvert the system, whether technological, bureaucratic or sociological.” (Lemos, 2002) Over the past decade, hacking has evolved to describe "people who have a practical interest in computer security and who circumvent that security." (Lemos 2002) As you explore deeper into the digital landscape, it becomes clearer that these hackers are subdivided into three groups of mixed individuals categorized by a hat system. This hat system was invented by the L0pht (pronounced “the loft”). one of the most famous old-school hacker groups on the Internet. This hat system was put in place to give mid-level hackers, like L0pht members, a category of their own, preventing them from being associated with criminal hackers, also known as black hats, and to corporate hackers and network maintainers, known as white hats. (Lemos, 2002) Since black and white were the extremes, the middle group consisting of the two would be considered gray hats to signify their neutrality and diversity. Each of these hacking cultures has its own set of allegiances, but these allegiances do not always remain the same for all Hat-class hackers. One of the best examples of this shifting allegiance is the Black Hat hacker. Black Hats are known as the masterminds of crime, but not all Black Hats are the bad guys. Most black hat hackers just hop on board and look for hard-to-hack systems to test their skills. This test of skills results in major security breaches and ultimately the black hats being labeled a threat. Most of their goals usually include hacking into systems for personal or financial gain...... middle of paper ... ever-changing technological world of treats and perks that surround them. Works Cited ABI Research. “BYOD and increasing malware threats are helping drive a billion-dollar mobile security services market in 2013.” BYOD and Rising Malware Threats Help Drive Billion-Dollar Mobile Security Services Market in 2013. Allied Business Intelligence, Inc., March 29, 2013. Web. April 19, 2014. .Lemos, Robert. “New law makes hacking a black-and-white choice.” CNET.com. CBS Interactive Inc, September 23, 2002. Web. April 19, 2014. .Olson, Parmy. “Your smartphone is the next big target for hackers.” CNN. Cable News Network, August 26, 2013. Web. April 19. 2013. .