The Vastness Of Hacking | The Odyssey Online
Start writing a post
Politics and Activism

The Vastness Of Hacking

The abstract world of hacking.

36
The Vastness Of Hacking

There is a saying among security officials that goes like this: There are two types of companies in the world — those that know they have been hacked and those that don’t yet know it. Some companies even go a step further and say there is a third one you can add to the list: Those that expect to be hacked soon.”

In the past we have heard in the news about the hacking of widely recognizable companies and government databases. A few years ago hackers were able to obtain Facebook users' passwords because of Facebook’s security failures. Hackers were able to obtain personal information by exploiting Facebook’s weak password security system. In addition the Chinese government have been hacking political campaigns such as the campaigns of Barack Obama and John McCain in 2008. In doing so, they were able to obtain internal documents like private emails.

The threat of being hacked is a threat to both government and to business at the cost of individual’s privacy. Yet most of the non-technical savvy people that I know have no interest in equipping themselves with the necessary knowledge.

This type of person wrongly assumes that all hackers are criminals committing an illegal act. However, hacking is more complex than just crime; it has many different aspects that I will explain. The key difference lies within the motive.

While this information will not prevent your business from being hacked, it is a start in learning more about what is out there. The many different classifications of hackers are as follows:

White hat hackers:
These are the good guys, otherwise known as ethical hackers. They do not illegally break into a computer’s network, rather they run a series of tests to check the efficiency of a company’s security systems. In doing so there is no personal or profit motive. The type of people who do this are usually computer security software manufacturers. They are the only line of defense between a company and a black hat hacker.

Black hat hackers:
These guys are the complete opposite of white hat hackers in both methodology and intention. When they gain access into a network it is usually to corrupt data for their own personal gain. Once they gain access they will share the information with other hackers to take advantage of the same vulnerabilities. These guys are the stereotypes of computer criminals.

Gray Hat Hackers:
They possess properties of both white and black hat hackers. Usually they scan the Internet to see flaws in a network. Once found they will hack into them and show the flaws to their administrator. In doing so they seek adequate compensation.

Blue hat hackers:
These are the rogue hackers like something you would see in a Denzel Washington movie. Security companies usually call them to check for vulnerabilities in their system. Before launching a new product, companies will hire them for testing their system.

Elite hackers:
Just as the name implies, these are the best. These are the people who are the first to break into impenetrable systems.

Skiddie:
Amateurs who hack the system using programs given out by elite hackers. They customarily hack a website for two reasons 1) excitement 2) to get recognized and gain more popularity among the hacker groups

Newbie:
The beginners of the hacking world. They have no experience and their intent is to learn the ways of the trade.

State-sponsored hackers:
One famous state-sponsored hacker is the “Online Blue Army” of China. These are the groups that belong to intelligence agencies who are heavily funded.

Hacktivists:
These are the guys who hack to advance social causes like religion, politics or personal beliefs. Their purpose is to deface a website or to embarrass the victim. They fall under two categories: right to information and cyber terrorism. The former is to take confidential information and expose it to the public because they believe all information is free. The latter is meant to cause widespread fear by destroying a system’s operation and making it useless in order to advance political motives.

Intelligence Agencies:
These are the guys who safeguard the national systems from foreign threats. The type of people who work for the intelligence agencies are blue hat hackers.

Organized Crime:
This is a group of black hat hackers who seek to find their own personal gain by exposing computer systems.

Report this Content
This article has not been reviewed by Odyssey HQ and solely reflects the ideas and opinions of the creator.
Kardashians
W Magazine

Whether you love them or hate them, it's undeniable the Kardashian/ Jenner family has built an enormous business empire. Ranging from apps, fashion lines, boutiques, beauty products, books, television shows, etc. this bunch has shown they are insane business moguls. Here are seven reasons why the Kardashian/ Jenner family should be applauded for their intelligent business tactics.

Keep Reading...Show less
friends
Photo by Elizeu Dias on Unsplash

If I have learned one thing in my lifetime, it is that friends are a privilege. No one is required to give you their company and yet there is some sort of shared connection that keeps you together. And from that friendship, you may even find yourself lucky enough to have a few more friends, thus forming a group. Here are just a few signs that prove your current friend group is the ultimate friend group.

Keep Reading...Show less
ross and monica
FanPop

When it comes to television, there’s very few sets of on-screen siblings that a lot of us can relate to. Only those who have grown up with siblings knows what it feels like to fight, prank, and love a sibling. Ross and Monica Geller were definitely overbearing and overshared some things through the series of "Friends," but they captured perfectly what real siblings feel in real life. Some of their antics were funny, some were a little weird but all of them are completely relatable to brothers and sisters everywhere.

Keep Reading...Show less
Lifestyle

11 Types Of Sorority Girls

Who really makes up your chapter...

3057
Sorority Girls
Owl Eyes Magazine

College is a great place to meet people, especially through Greek life. If you look closely at sororities, you'll quickly see there are many different types of girls you will meet.

1. The Legacy.

Her sister was a member, her mom was a member, all of her aunts were members, and her grandma was a member. She has been waiting her whole life to wear these letters and cried hysterically on bid day. Although she can act entitled at times, you can bet she is one of the most enthusiastic sisters.

Keep Reading...Show less
Lifestyle

10 Reasons Why Life Is Better In The Summertime

Winter blues got you down? Summer is just around the corner!

2661
coconut tree near shore within mountain range
Photo by Elizeu Dias on Unsplash

Every kid in college and/or high school dreams of summer the moment they walk through the door on the first day back in September. It becomes harder and harder to focus in classes and while doing assignments as the days get closer. The winter has been lagging, the days are short and dark, and no one is quite themselves due to lack of energy and sunlight. Let's face it: life is ten times better in the summertime.

Keep Reading...Show less

Subscribe to Our Newsletter

Facebook Comments