Types of Hackers: White Hat vs. Black Hat & Every Shade in Between

在巴黎的恐怖袭击之后不久公开,一群名为“匿名”的黑客采取了行动。他们的小组发言人发布了一个YouTube视频,并说:“等等,那么,从匿名的巨大反应......等待许多网络攻击......战争已被宣布。准备自己。“从这里开始,他们继续取消他们声称是使用全球成员的成员的结合攻击技能的数千个ISIS推特账户。
Though it is debated whether this kind of cyber action is truly helpful, the response shows that hacking can take on many forms—some good, some bad and some falling into a rather gray zone.
If you have an interest in coding or programming, you’re probably aware that there are different types of hackers out there. You’ve possibly heard of the terms, “white hat,” “black hat” and “gray hat” hackers, but what do they really mean?
继续阅读,了解更多有关这些黑客的区别特征以及如何利用您的黑客技能为他人的利益 - 即使在职业生涯中也是如此。
3种类型的哈ckers in the tech world
The term “hacker” carries a rather negative connotation for most people. But gone are the days where we view hackers as the iconic nerds sitting in a shabby basement with ski masks on.
Hacking skills have become more and more advanced and in-demand as both companies and countries strive to protect their information, software and networks. As a result of the demand, many more people possess formidable hacking skill these days.
But it’s up to them to decide if they’d like to use those skills for the benefit or detriment of the greater good.
1.谁是“黑色帽子黑客?”
Black hat hackers are the criminals of the online world. These are the folks who give hackers a bad name. They are in it for often selfish reasons, exploiting individuals for money, prestige or incriminating information. These individuals have no regard for the law and often hack to commit other, bigger crimes.
“这些是违反个人收益的计算机安全的黑客,”Shawn Pope解释说:CCNA安全工程师鼻塞。这将是窃取信用卡信息或身份盗窃。
Some black hat hackers just want the attention. “‘Script Kiddies’ is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves,” says罗伯特西西里亚诺, identity theft expert withBestIDTheftCompanys.com.
无论特定的动机如何,都可以将黑帽黑客识别为那些使用他们能力利用其他人的个人收益的人。
2. Who are “white hat hackers?”
“These are the good guys,” Siciliano says. “Computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure.”
白色帽子,也被称为“道德黑客”,可以帮助公司和政府通过首先攻击他们的网络和安全来找到漏洞。他们进入系统以发现责任在坏人之前。
“If they do happen to find a security hole in the network or a flaw in software, they report these issues back to the organization so they can take the proper steps to address the vulnerabilities,” Pope explains.
基本上,如果您的工资单有白帽黑客,他们希望首先达到数据库中的任何弱点,以帮助您在某人利用它们之前解决泄漏。有几个职位,其中黑客可以利用他们的技能来帮助公司,保护信息甚至与他们的黑客能力相抗。在本文后面概述了一些职业机会。
3. Who are “gray hat hackers?”
Gray hat hackers find themselves somewhere in the middle on the spectrum between helping others and self-gain. “Some gray hats, referred to as ‘hacktivists,’ look for ways to expose wrongdoing, exact revenge or harass a target,” according to Siciliano.
从技术上讲,这种黑客在未经许可的情况下完成,因此即使没有恶意的意图,它仍然被认为是非法的。就像Vigilante正义一样,灰色帽子黑客可能会产生理想的结果,但他们在法律之外这样做。
“A gray hat hacker is the type that might exploit a vulnerability, but instead of using it for personal gain, they might then contact the organization and allow them to fix the problem,” Pope says. He adds that some gray hats might even post the vulnerability online for either a white hat or black hat to discover.
白帽黑客有什么职业?
You now have a basic understanding of the differences between these types of hackers. If you’re intrigued at the idea of using your hacking skills for the greater good, you’re probably wondering what career opportunities are out there.
Here are three positions that are perfect for white hat hackers.
1. Cybersecurity engineer
“Using their advanced knowledge of malware, viruses, theft, DDoS attacks and other digital threats, cybersecurity engineers defend organizations against crime online,” Siciliano explains.
These professionals are, in simple terms, really good hackers. They build, maintain and improve IT security solutions for companies. As a cybersecurity engineer, you’ll perform vulnerability testing and security assessments, and creating solutions when problems are detected.
2. Malware analyst
Malware analysts are experts in malware, which is software intended to damage computers and computer systems. Siciliano compares them to oncologists fighting cancer. “There’s research, removal or treatment, and it’s up to you to decide how you apply your training.”
In this highly specialized information security position, you’ll be tasked with identifying and disabling new and dangerous forms of malware. You’ll need to be fluent in multiple programming languages, have a deep understanding of computer systems and be a master problem solver.
3. Chief information security officer (CISO)
If you’re extra ambitious, you may have your sights set on this senior-level information security career.The CISO is responsible foroverseeing all cyber security efforts within an organization. “They help prep a company for combatting cyberattacks, lead investigations searching for holes in a network, monitor security operations and manage other personnel,” according to Siciliano.
You’ll need to have a good amount of information security experience under your belt before advancing to this position, but once you do, you can use your hacking and security expertise to lead the charge for an entire army in the fight against cybercrime.
Join the fight
没有w you have a basic understanding of white hat hackers versus black hat hackers (and those somewhere in between). These different types of hackers make up just a portion of the broader field ofinformation security。
Learn about more career opportunities that leverage your skills and interests in our article,5帮助打击网络犯罪的信息安全工作。
相关文章:
