![]() A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.įor example, a black hat hacker would compromise a computer system without permission, stealing the data inside for their own personal gain or vandalizing the system. A gray-hat hacker falls somewhere between a black hat and a white hat. ![]() Very few things in life are clear black-and-white categories. ![]() Various organizations pay “bounties” or award prizes for revealing such discovered vulnerabilities, compensating white-hats for their work. This is known as “penetration testing,” and it’s one example of an activity performed by white-hat hackers.Ī white-hat hacker who finds a security vulnerability would disclose it to the developer, allowing them to patch their product and improve its security before it’s compromised. ![]() However, instead of using their access to steal from the organization or vandalize its systems, the white-hat hacker reports back to the organization and informs them of how they gained access, allowing the organization to improve their defenses. The white-hat hacker uses their knowledge of computer security systems to compromise the organization’s systems, just as a black hat hacker would. The organization authorizes the white-hat hacker to attempt to compromise their systems. For example, many white-hat hackers are employed to test an organizations’ computer security systems.
0 Comments
Leave a Reply. |