+ | - | reset

Cyber criminals are as diverse as their real-world counterparts. In the last five years, there have been cyber attacks targeted at all sorts of organisations. These criminal activities include breaking into private networks, stealing data and installing ransomware, etc. Every individual is responsible for an organisation’s cyber security and it is vital that you know your enemies and implement effective cyber security measures.

3 Types of Cyber Attackers
  1. White Hats
  1. Black Hats
  • Black Hats are criminals, who use their ability to plunder individuals or organisations. They explore or develop software deficiencies and attack methods or other malicious tools to break into machines and steal data, such as passwords, email, intellectual property, credit card numbers or bank account credentials.
    Source: http://www.wonderslist.com/top-10-black-hat-hackers/
  1. Grey Hats
  • Grey Hats fall into the middle ground between the White and Black Hat categories. Often, Grey Hat hackers look to expose vulnerabilities in a system to inform an organisation of the defect or share it with a group of people. Although, these hackers are not usually motivated by personal gain, their actions may be considered illegal or unethical.
    Source: http://www.bbc.com/news/technology-28524909

Key takeaways

Two factors that determine the type of hacker:

  1. What are their intentions?
  2. Are their intentions law-breaking?

Four primary motivators:

  1. Financial Gain
  2. Ideology or Politics
  3. Entertainment
  4. Cyber Protection

Not all hackers have malicious intent. Hacking can be used for good and evil, it boils down to the hacker’s intent. In mainstream media, the term “hacker” is usually related to cyber criminals. A hacker could be anyone regardless of intentions or methods. Hacking is not an illegal activity unless their actions compromises a system without an owner’s permission.

This article was first published here.

Download the publication at the right sidebar to read more.

Photo by Markus Spiske on Unsplash.

Rate this article

/ 5.

Is this article good for you?
5.0
6 Mins  Read

How to Safeguard Data While Ethically Leveraging its Value

23 October 2020

READ MORE
Share
5.0
2 Mins  Read

3 Types of Cyber Attackers

21 May 2020

READ MORE
Share
5.0
2 Mins  Read

7-Stages of Cyber Kill Chain

21 May 2020

READ MORE
Share

Survey

View
Calendar