Editor's Note: Hacking of computer systems sometimes appears to be a recent phenomenon. Back in the very early days of the Internet in 1988, a Cornell graduate student, Robert Tappen Morse created one of the first computer worms. It landed him in hot water and ultimately the first to be convicted under the comptuer fraud and abuse act. He eventually became a professor of computer science at MIT.
Today, there are different types of hackers exploiting vulnerabilities in computer systems and networks. This article discusses the differences among black hat, white hat and grey hat hackers..
Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission. Many companies and government agencies actually employ hackers to help them secure their systems.
Hackers are generally categorized by type of metaphorical “hat” they don: “white hat”, “grey hat”, and “black hat”. The terms come from old spaghetti westerns, where the bad guy wears a black cowboy hat, and the good guy wears a white hat. There are two main factors that determine the type of hacker you’re dealing with: their motivations, and whether or not they are breaking the law.
With the end of the year upon us, we begin looking at what's going to happen in 2015. However, we also look back on the year just ended. In that regard, we took a look at our Business EDGE eNews Blog and reviewed the top five most read articles for 2014:
1. Myths regarding the use of refilled toner cartridges: www.compcenter.com/client/index.cfm/2014/4/16/Myths-regarding-the-use-of-refilled-toner-cartridges
2. Securty Habits of Effective PC Users: www.compcenter.com/client/index.cfm/2014/3/31/Security-Habits-of-Effective-PC-Users
The Internet of Everything heralds a new kind of world for everyone. But it also requires a new way of thinking about IT security.
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.
The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.