Nt1330 Week 2 Research Assignment

613 Words2 Pages

Week 2 research Assignment

White Hat Hackers
White hat hackers are known as a person who identifies weaknesses within a computer system or network. However, instead of taking advantage of them like black hat hackers do, the white hat hackers assist in exposing the weaknesses to the system’s owners in efforts to repair the weakness keep others from taking advantage of it. White hat hackers also recommends fixes to the owners. Many major corporations employ people like this to help keep their systems secure.
Black Hat Hackers
Black hat hackers are the complete opposite of white hat hackers. The search for, and exploit weaknesses in systems for their own personal gain. Their intent is to steal, do malicious harm, and deface networks and computer …show more content…

The gray hats work on both sids of the hacking fence by discovering and supplying information about network security and weaknesses to network administrators, and also to black hat hackers. Depending on what benefits them the most. Some gray hat hackers may work in conjunction with black hat hackers and benefit monetarily from any illicit …show more content…

He also can collect data to prove a point of discretion by private or business entities against the public health and interests. Never does he use his skills for monetary gain, but only to exercise for enhanced understanding and collecting details that would make a difference. A direct quote and explanation from him. I support this idea because he supports the people who need help from people like him. This also explains the typical hacker profile he fits based on the intentions of a typical gray hat hacker. Two techniques he uses is passive data collection using open data, and actively probing a target once it’s discovered. Passive data collection could include using hardware to detect and measure data emanating from places. For example, the Genie manufacturing plant makes a ton of noise at night, and my husband records the sound from it with his hardware, recording the level, time, and disturbance. He could easily use a Bluetooth sniffer, or wifi sniffer, or some other RF detection device to establish a case using data freely flowing from the facility. Actively probing a target includes probing the IP on networks that are not necessarily secured. Such as a Safeway or Home Depot wireless network. When probing the IPs, he can probe them for open ports in the IPs. He can fingerprint each IP to discover what sort of hardware the wireless is, giving him a clue as to how useful it is to

More about Nt1330 Week 2 Research Assignment

Open Document