Difference between revisions of "Black hat hacker"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
 
Black Hat Hackers are a type of hackers who illegally access computer systems, without the owner's consent, in order to abuse and/or vandalize the system.  While [[White hat hacker|white hat hackers]] attempt to hack for the greater good black hat hackers are primarily focused on committing criminal activities such as identity theft, fraud, and vandalism.<ref name="Black Hats"> Baskerville, R. (2007). Hacker Wars: Cyber Warfare Previews. E-Collaboration in Modern Organizations: Initiating and Managing Distributed Projects: Initiating and Managing Distributed Projects, 162. https://books.google.com/books?hl=en&lr=&id=Zd3O1COhMMkC&oi=fnd&pg=PT179&dq=%22black+hat+hacker%22+define&ots=bdIsNpopO7&sig=P0uwPSPOEjkT_K1udN8HZNAD9qw#v=onepage&q&f=false</ref>
 
Black Hat Hackers are a type of hackers who illegally access computer systems, without the owner's consent, in order to abuse and/or vandalize the system.  While [[White hat hacker|white hat hackers]] attempt to hack for the greater good black hat hackers are primarily focused on committing criminal activities such as identity theft, fraud, and vandalism.<ref name="Black Hats"> Baskerville, R. (2007). Hacker Wars: Cyber Warfare Previews. E-Collaboration in Modern Organizations: Initiating and Managing Distributed Projects: Initiating and Managing Distributed Projects, 162. https://books.google.com/books?hl=en&lr=&id=Zd3O1COhMMkC&oi=fnd&pg=PT179&dq=%22black+hat+hacker%22+define&ots=bdIsNpopO7&sig=P0uwPSPOEjkT_K1udN8HZNAD9qw#v=onepage&q&f=false</ref>
  
The security industry refers to black hat hackers as also “crackers”. These crackers discover and exploit system vulnerabilities. Their actions are motivated by personal agendas and may modify the system to secure control over the network.<ref name="Black Hats"> Marakas, B. (2011). Management Information Systems, pp. 536-537. . ISBN 978-0-07-752217-9.</ref>
+
The security industry refers to black hat hackers as also “crackers”. These crackers discover and exploit system vulnerabilities. Their actions are motivated by personal agendas and may modify the system to secure control over the network.<ref name="Crackers"> Marakas, B. (2011). Management Information Systems, pp. 536-537. . ISBN 978-0-07-752217-9.</ref>
  
 
=References:=  
 
=References:=  

Revision as of 07:41, 23 November 2015

Black Hat Hackers are a type of hackers who illegally access computer systems, without the owner's consent, in order to abuse and/or vandalize the system. While white hat hackers attempt to hack for the greater good black hat hackers are primarily focused on committing criminal activities such as identity theft, fraud, and vandalism.[1]

The security industry refers to black hat hackers as also “crackers”. These crackers discover and exploit system vulnerabilities. Their actions are motivated by personal agendas and may modify the system to secure control over the network.[2]

References:

  1. Baskerville, R. (2007). Hacker Wars: Cyber Warfare Previews. E-Collaboration in Modern Organizations: Initiating and Managing Distributed Projects: Initiating and Managing Distributed Projects, 162. https://books.google.com/books?hl=en&lr=&id=Zd3O1COhMMkC&oi=fnd&pg=PT179&dq=%22black+hat+hacker%22+define&ots=bdIsNpopO7&sig=P0uwPSPOEjkT_K1udN8HZNAD9qw#v=onepage&q&f=false
  2. Marakas, B. (2011). Management Information Systems, pp. 536-537. . ISBN 978-0-07-752217-9.