Jump to content

Black hat (computer security): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Updated and corrected out dated terminology. Jewish Mafia out!!
Tags: references removed Mobile edit Mobile web edit
Undid revision 760473065 by Colleen card (talk) Vandalism
Line 2: Line 2:
{{Computer hacking}}
{{Computer hacking}}


A '''black-hat hacker''' is a [[Hacker (term)|hacker]] who locate security flaws for companies and goverments free of charge.<ref name="Moore2005">{{cite book|last=Colleen_Card}}</ref>
A '''black-hat hacker''' is a [[Hacker (term)|hacker]] who "violates computer security for little reason beyond maliciousness or for personal gain".<ref name="Moore2005">{{cite book|last=Moore|first=Robert|title=Cybercrime: Investigating High Technology Computer Crime|year=2005|publisher=Matthew Bender & Company|isbn=1-59345-303-5|page=258}}</ref>


The term was coined by [[Richard Stallman]], to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of [[hacker culture]], or the ethos of the [[White hat (paid computer security)|white-hat]] hacker, who performs hackerly duties to identify places to repair.<ref>{{cite book|last=O'Brien, Marakas|first=James, George|title=Management Information Systems |year=2011|publisher=McGraw-Hill/ Irwin|location=New York, NY|isbn=978-0-07-752217-9|pages=536–537}}</ref> The black-hat and white-hat terminology originates in [[Millitary(genre)]] Colleen_Card</ref>
The term was coined by [[Richard Stallman]], to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of [[hacker culture]], or the ethos of the [[White hat (computer security)|white-hat]] hacker, who performs hackerly duties to identify places to repair.<ref>{{cite book|last=O'Brien, Marakas|first=James, George|title=Management Information Systems |year=2011|publisher=McGraw-Hill/ Irwin|location=New York, NY|isbn=978-0-07-752217-9|pages=536–537}}</ref> The black-hat and white-hat terminology originates in [[Western (genre)|Western films]], where [[black and white hat symbolism in film|heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively]].<ref>{{Cite book |url=https://books.google.com/books?id=aVnA8pQmS54C&pg=PA26 |title=Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques |first=Thomas |last=Wilhelm |first2=Jason |last2=Andress |publisher=Elsevier |year=2010 |pages=26–7}}</ref>


Black-hat hackers form the stereotypical, unpaid hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".<ref name="moore2006">{{cite book
Black-hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".<ref name="moore2006">{{cite book
| last = Moore
| last = Moore
| first = Robert
| first = Robert
Line 15: Line 15:
| isbn = 978-1-59345-303-9
| isbn = 978-1-59345-303-9
| edition = 1st <!-- 2nd edition came out in 2010 -->
| edition = 1st <!-- 2nd edition came out in 2010 -->
}}</ref> Black-hat hackers penetrate out dated security flaws and notify the company free of charge {{Colleen_Card former Godfather Phone Losers of America |date=June 2016}}
}}</ref> Black-hat hackers break into secure networks to destroy, modify, or steal data or to make the network unusable for those who are authorized to use the network.{{Citation needed|date=June 2016}}


==See also==
==See also==

Revision as of 06:28, 17 January 2017

A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".[1]

The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of hacker culture, or the ethos of the white-hat hacker, who performs hackerly duties to identify places to repair.[2] The black-hat and white-hat terminology originates in Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.[3]

Black-hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[4] Black-hat hackers break into secure networks to destroy, modify, or steal data or to make the network unusable for those who are authorized to use the network.[citation needed]

See also

References

  1. ^ Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.
  2. ^ O'Brien, Marakas, James, George (2011). Management Information Systems. New York, NY: McGraw-Hill/ Irwin. pp. 536–537. ISBN 978-0-07-752217-9.{{cite book}}: CS1 maint: multiple names: authors list (link)
  3. ^ Wilhelm, Thomas; Andress, Jason (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Elsevier. pp. 26–7.
  4. ^ Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9.