Professional Documents
Culture Documents
Hackers
Hackers
by
noah
and
Robsen
hackers
Prepared by :- Robsen merga
Noah ageze
Who are hacker?
A hacker is a highly skilled person on cyber security, computer system and
networks. In other word they are master of computer world .
Hacking often refers to unauthorized intrusion into a network or computer;
normally carried out by one or more hackers. However a hacker can be any
one.
They can work solo or be employed by an organization that has the motive to
disrupt something or cause havoc unnecessarily. Often they look to alter
security system to achieve their goal, which differ from the actual purpose of
the system.
There are many organization who hire hackers as part of their staff. These
hackers use their skills to find flaws, vulnerable areas, and weak spots in the
organization’s security system. This is done to find the weaknesses and
prevent malicious hackers from breaking in the security system.
Type of hackers
1. Black hat hacker :-
The activity of hacker can be 1. Classic black hat hacker
harmful or useful. If hacker tries to
2. Suicide hacker
steal any private data money
etc…,this type of hacker is illegal 2. White hat hacker :-
but if he/she use this expertise for
1. White hat hacker
securing any system from other
hackers then they are ethical 2. Red hat hacker
hacker. 3. State/Nation sponsored hacker
So based on this a hacker can be 3. Grey hat hacker :-
grouped in main three group.
1. Grey hat hacker
These main groups and their sub
groups are stated to the right. 2. Malicious insider or whistleblower
Black hat hacker
Classic black hat hacker
Motivation : personal gain, money, Data
Action : steal, destroy, and manipulate.
Behavior : illegal
These hackers are the most dangerous hacker types. Their main motivation is
using their knowledge to gain critical data, steal money from accounts & etc.
This type of hackers create malware & other harmful programs & with these
programs, they detect the vulnerabilities of the system.
After entering the system, they can learn important business, personal or
financial private data. They can destroy the systems and manipulate
computer system behavior.
Generally they are the one who are behind many critical cyber crimes. They
work in the dark pat of the web.
Suicide hacker
Suicide hacker are the ones who knows that they will caught by the
cyber teams. Although knowing this, he/she acts and hacks the
systems. This is like suicide bombers. The main motivation of this
group is high money offer or a big revenge from their enemies.
White hat hacker
1. White hat hacker
Motivation : provide security
Action : cyber security activities
Behaviors : legal
White hat hacker are the golden guys in the computer world. They are
ethical hackers. They are the heroes of government and many
organization who need cyber security.
They are the computer system expert who has an excellent knowledge like
the black. The key deference is the one steal data as a thief, and the
other wait in the door like a guard.
During integration & operation, system can have many back holes. Ethical
hackers detect it by many way, after that they close it.
So generally they are security provider for cyber institution.
2.Red hat hacker
Motivation : revenge
Actions : cyber security activities & attack back
Behavior : legal aggressive
They are white hat hacker with only a little difference. Red hat hacker do
not defend only. He/she also attack backs to the hacker.
Here the main aim is not only detect the vulnerabilities and defend toward
the hacker but also defeating the hacker.
As a summery red hat hackers are good but a little aggressive guys. They
would like to defeat the evil in its house.
“ who knows, may be the best defense is offence sometime. “
3.State/Nation sponsored hackers