Black hat (computer security): Difference between revisions
Colleen card (talk | contribs) Updated and corrected out dated terminology. Jewish Mafia out!! Tags: references removed Mobile edit Mobile web edit |
Undid revision 760473065 by Colleen card (talk) Vandalism |
||
Line 2: | Line 2: | ||
{{Computer hacking}} |
{{Computer hacking}} |
||
A '''black-hat hacker''' is a [[Hacker (term)|hacker]] who |
A '''black-hat hacker''' is a [[Hacker (term)|hacker]] who "violates computer security for little reason beyond maliciousness or for personal gain".<ref name="Moore2005">{{cite book|last=Moore|first=Robert|title=Cybercrime: Investigating High Technology Computer Crime|year=2005|publisher=Matthew Bender & Company|isbn=1-59345-303-5|page=258}}</ref> |
||
The term was coined by [[Richard Stallman]], to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of [[hacker culture]], or the ethos of the [[White hat ( |
The term was coined by [[Richard Stallman]], to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of [[hacker culture]], or the ethos of the [[White hat (computer security)|white-hat]] hacker, who performs hackerly duties to identify places to repair.<ref>{{cite book|last=O'Brien, Marakas|first=James, George|title=Management Information Systems |year=2011|publisher=McGraw-Hill/ Irwin|location=New York, NY|isbn=978-0-07-752217-9|pages=536–537}}</ref> The black-hat and white-hat terminology originates in [[Western (genre)|Western films]], where [[black and white hat symbolism in film|heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively]].<ref>{{Cite book |url=https://books.google.com/books?id=aVnA8pQmS54C&pg=PA26 |title=Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques |first=Thomas |last=Wilhelm |first2=Jason |last2=Andress |publisher=Elsevier |year=2010 |pages=26–7}}</ref> |
||
Black-hat hackers form the stereotypical, |
Black-hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".<ref name="moore2006">{{cite book |
||
| last = Moore |
| last = Moore |
||
| first = Robert |
| first = Robert |
||
Line 15: | Line 15: | ||
| isbn = 978-1-59345-303-9 |
| isbn = 978-1-59345-303-9 |
||
| edition = 1st <!-- 2nd edition came out in 2010 --> |
| edition = 1st <!-- 2nd edition came out in 2010 --> |
||
}}</ref> Black-hat hackers |
}}</ref> Black-hat hackers break into secure networks to destroy, modify, or steal data or to make the network unusable for those who are authorized to use the network.{{Citation needed|date=June 2016}} |
||
==See also== |
==See also== |
Revision as of 06:28, 17 January 2017
Part of a series on |
Computer hacking |
---|
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".[1]
The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of hacker culture, or the ethos of the white-hat hacker, who performs hackerly duties to identify places to repair.[2] The black-hat and white-hat terminology originates in Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.[3]
Black-hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[4] Black-hat hackers break into secure networks to destroy, modify, or steal data or to make the network unusable for those who are authorized to use the network.[citation needed]
See also
References
- ^ Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.
- ^ O'Brien, Marakas, James, George (2011). Management Information Systems. New York, NY: McGraw-Hill/ Irwin. pp. 536–537. ISBN 978-0-07-752217-9.
{{cite book}}
: CS1 maint: multiple names: authors list (link) - ^ Wilhelm, Thomas; Andress, Jason (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Elsevier. pp. 26–7.
- ^ Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9.