The Vastness Of Hacking | The Odyssey Online
Start writing a post
Politics and Activism

The Vastness Of Hacking

The abstract world of hacking.

68
The Vastness Of Hacking

There is a saying among security officials that goes like this: There are two types of companies in the world — those that know they have been hacked and those that don’t yet know it. Some companies even go a step further and say there is a third one you can add to the list: Those that expect to be hacked soon.”

In the past we have heard in the news about the hacking of widely recognizable companies and government databases. A few years ago hackers were able to obtain Facebook users' passwords because of Facebook’s security failures. Hackers were able to obtain personal information by exploiting Facebook’s weak password security system. In addition the Chinese government have been hacking political campaigns such as the campaigns of Barack Obama and John McCain in 2008. In doing so, they were able to obtain internal documents like private emails.

The threat of being hacked is a threat to both government and to business at the cost of individual’s privacy. Yet most of the non-technical savvy people that I know have no interest in equipping themselves with the necessary knowledge.

This type of person wrongly assumes that all hackers are criminals committing an illegal act. However, hacking is more complex than just crime; it has many different aspects that I will explain. The key difference lies within the motive.

While this information will not prevent your business from being hacked, it is a start in learning more about what is out there. The many different classifications of hackers are as follows:

White hat hackers:
These are the good guys, otherwise known as ethical hackers. They do not illegally break into a computer’s network, rather they run a series of tests to check the efficiency of a company’s security systems. In doing so there is no personal or profit motive. The type of people who do this are usually computer security software manufacturers. They are the only line of defense between a company and a black hat hacker.

Black hat hackers:
These guys are the complete opposite of white hat hackers in both methodology and intention. When they gain access into a network it is usually to corrupt data for their own personal gain. Once they gain access they will share the information with other hackers to take advantage of the same vulnerabilities. These guys are the stereotypes of computer criminals.

Gray Hat Hackers:
They possess properties of both white and black hat hackers. Usually they scan the Internet to see flaws in a network. Once found they will hack into them and show the flaws to their administrator. In doing so they seek adequate compensation.

Blue hat hackers:
These are the rogue hackers like something you would see in a Denzel Washington movie. Security companies usually call them to check for vulnerabilities in their system. Before launching a new product, companies will hire them for testing their system.

Elite hackers:
Just as the name implies, these are the best. These are the people who are the first to break into impenetrable systems.

Skiddie:
Amateurs who hack the system using programs given out by elite hackers. They customarily hack a website for two reasons 1) excitement 2) to get recognized and gain more popularity among the hacker groups

Newbie:
The beginners of the hacking world. They have no experience and their intent is to learn the ways of the trade.

State-sponsored hackers:
One famous state-sponsored hacker is the “Online Blue Army” of China. These are the groups that belong to intelligence agencies who are heavily funded.

Hacktivists:
These are the guys who hack to advance social causes like religion, politics or personal beliefs. Their purpose is to deface a website or to embarrass the victim. They fall under two categories: right to information and cyber terrorism. The former is to take confidential information and expose it to the public because they believe all information is free. The latter is meant to cause widespread fear by destroying a system’s operation and making it useless in order to advance political motives.

Intelligence Agencies:
These are the guys who safeguard the national systems from foreign threats. The type of people who work for the intelligence agencies are blue hat hackers.

Organized Crime:
This is a group of black hat hackers who seek to find their own personal gain by exposing computer systems.

Report this Content
This article has not been reviewed by Odyssey HQ and solely reflects the ideas and opinions of the creator.
Entertainment

Every Girl Needs To Listen To 'She Used To Be Mine' By Sara Bareilles

These powerful lyrics remind us how much good is inside each of us and that sometimes we are too blinded by our imperfections to see the other side of the coin, to see all of that good.

814094
Every Girl Needs To Listen To 'She Used To Be Mine' By Sara Bareilles

The song was sent to me late in the middle of the night. I was still awake enough to plug in my headphones and listen to it immediately. I always did this when my best friend sent me songs, never wasting a moment. She had sent a message with this one too, telling me it reminded her so much of both of us and what we have each been through in the past couple of months.

Keep Reading...Show less
Zodiac wheel with signs and symbols surrounding a central sun against a starry sky.

What's your sign? It's one of the first questions some of us are asked when approached by someone in a bar, at a party or even when having lunch with some of our friends. Astrology, for centuries, has been one of the largest phenomenons out there. There's a reason why many magazines and newspapers have a horoscope page, and there's also a reason why almost every bookstore or library has a section dedicated completely to astrology. Many of us could just be curious about why some of us act differently than others and whom we will get along with best, and others may just want to see if their sign does, in fact, match their personality.

Keep Reading...Show less
Entertainment

20 Song Lyrics To Put A Spring Into Your Instagram Captions

"On an island in the sun, We'll be playing and having fun"

719628
Person in front of neon musical instruments; glowing red and white lights.
Photo by Spencer Imbrock on Unsplash

Whenever I post a picture to Instagram, it takes me so long to come up with a caption. I want to be funny, clever, cute and direct all at the same time. It can be frustrating! So I just look for some online. I really like to find a song lyric that goes with my picture, I just feel like it gives the picture a certain vibe.

Here's a list of song lyrics that can go with any picture you want to post!

Keep Reading...Show less
Relationships

The Importance Of Being A Good Person

An open letter to the good-hearted people.

1026985
Chalk drawing of scales weighing "good" and "bad" on a blackboard.
WP content

Being a good person does not depend on your religion or status in life, your race or skin color, political views or culture. It depends on how good you treat others.

We are all born to do something great. Whether that be to grow up and become a doctor and save the lives of thousands of people, run a marathon, win the Noble Peace Prize, or be the greatest mother or father for your own future children one day. Regardless, we are all born with a purpose. But in between birth and death lies a path that life paves for us; a path that we must fill with something that gives our lives meaning.

Keep Reading...Show less

Subscribe to Our Newsletter

Facebook Comments