You are on page 1of 5

1.

TYPES OF HACKING
1.1

BLACK HAT HACKING:

Black hat hacking is the type of hacking in which the hacker violates
computer security for personal benefits and transferring malicious
data. Black hat hackers form the stereotypical, illegal hacking groups
often portrayed in popular culture, and are "the epitome of all that the

Fig: Black Hat Hacking

Public fears in a computer criminal". Black hat hacking basically


involves breaking into secure network centers and hubs in order to
intentionally destroy copy and steal data. Black hat hackers are
commonly termed as crackers.
1.1.1) SCOPE OF using BLACK HAT HACKING:

Crackers usually keep track of the vulnerabilities to the system and


try to find a path to invade into the network. Privacy and freedom are
often not kept secure in black hat hacking. Once they have gained
control over a system, they may apply patches or fixes to the system

only to keep their reigning control. This type of hacking is almost


opposite in sense to the white hat hacking.
This is actually the most talked about type of hacking currently. Black
hat hackers do not work for organizations. They may work individually
or in small groups. Cases of hacking, extorting and then threatening
are all related to black hat hacking.
1.2

WHITE HAT HACKING aka ETHICAL HACKING:

In white hat hacking the hacker breaks security and corrupts systems
for non malicious and non beneficial
reasons, which in turn may be manifolds.
This might be done in order to test
security systems for some legal
employers or to test upon some security
servers. Basically a white hat hacker is
an Ethical Hacker. The EC-Council, also
known as The Council of Electronic
Commerce and Consultants, has made
many courses tutorials and certifications
Fig: White Hat Hacking

available for those who are interested on learning the art of Ethical
Hacking.

1.2.1) SCOPE OF using WHITE HAT HACKING:

Basically white hat hacking is used to undo the damage that has
been done and to prevent any further potential damages from
happening on networks and servers because of cyber criminals and
Black Hat Hackers.
Generally white hat hackers are employed in companies to protect
plagiarism and corruption of data and preventing the same from going
into wrong hands.

1.3

GRAY HAT HACKING:

Gray hat hacking lies somewhere in between black hat and white hat
hacking. It does not involve intentional criminal activities and
corruption of systems for personal gains. But there might be
instances that the hacker may unknowingly cause damage to
networks and servers.

Fig: Gray Hat Hacking

1.3.1) SCOPE OF using GRAY HAT HACKING:

Gray hat hackers do not work for organizations. For instance, in case
they find a loophole in some security networks they do not privately
inform the concerned organization about the same. Instead they
disclose the fact publicly. This still leaves an opportunity for the
company to repair upon the faults in security, but may leave the
network vulnerable to the hands of black hat hackers.

1.4

BLUE HAT HACKING :

Blue hat hacking involves personnel who are not actually employed in
a company but work indirectly for the same. As soon as the big
companies launch a new product in the e-market they try to fix all the

Fig: Blue Hat Hacking

bugs in the software for better performance and attracting more


users.

1.4.1) SCOPE OF using BLUE HAT HACKING:

Blue hat hackers are hired for the same task of debugging the
software and return the same back to the company. Microsoft, Apple
etc. are some of the brands that take help of debuggers.
So, blue hat hacking increases opportunities of working at home for
multinational companies and being paid heftily for the simple work of

coding. This further increases job prospects and knowledge about


software functioning.