wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

DMZ: Your Secret Weapon for Data Security

Blog banner

Article on Zoho Corporation

Blog banner

TRIGGERS IN DATABASE

Blog banner

Disk scheduling

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

INTERNET SECURITY

Blog banner

Big Data Architecture

Blog banner

Deadlock and Starvation

Blog banner

Landslide Hazard

Blog banner

Disk scheduling

Blog banner

Security in Operating Systems

Blog banner

Understanding E-mail Servers

Blog banner

Types of Threads

Blog banner

Memory management

Blog banner

EID UL FITR

Blog banner

Electronic data interchange

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Evolution of Operating system

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Blockchain in IoT Applications

Blog banner

Capacity management in ITSM

Blog banner

Semaphores

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Record Blocking

Blog banner

Different Types of Data

Blog banner

Sweet Mango Murabba

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Memory Management

Blog banner

A True Friendship

Blog banner

Modern Operating System

Blog banner

John Titor: The Time Traveler

Blog banner

PYTHON

Blog banner

History of ITIL

Blog banner

Cloud Computing

Blog banner

What is Vishing?

Blog banner

Save Girl Child

Blog banner

File management

Blog banner

Multiprocessor and scheduling

Blog banner

10 Signs your Computer has Virus

Blog banner

What is Data, Information and Knowledge?

Blog banner

Cyber Security Control

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner