This website uses cookies to ensure you have the best experience. Learn more

Gray Hat Hacking Essay

2153 words - 9 pages

Gray-Hat Hacking

Overview

Computer security is a growing concern with the onset of always-on connections in the home and the emerging global network. More and more people become connected everyday. The reliance on computers in our daily lives has increased the need for security and has shifted the ethical line for hackers and hacking.

“A hacker is someone with deep knowledge of and great interest in a system. A hacker is someone who likes to delve into the inner workings of a system to find out how it works.”2 The definition of a hacker has been skewed in recent years by the press to connotate people who break into computer systems. The term has also evolved to represent people who protect computer systems and those that break into them. These newly termed hackers can be classified into three categories white-hat, black-hat, and gray-hat hackers. White-hat hackers are employed by corporations and work on the good side to secure computer systems without breaking into them. Black-hat hackers work on the bad side and attempt to compromise systems in illegal ways. Gray-hat hackers occupy the gray space of hacking and break into systems to learn and expose flaws, often as a service to the computer community. The ethical line dividing white-hat hackers and black-hat hackers is clear. However, the line that separates gray-hat hackers from black-hat hackers is constantly shifting in the new global network. Hacking that may have been considered ethical yesterday may not be true today due to the impact on global systems in the form of dollars loss and downtime.

Hacking has evolved from simply having knowledge of systems by harmlessly breaking into them to an issue of security and computer crimes (cybercrimes). Hacking attacks originate from all parts of the world and, in most cases, hackers can be tracked down and captured. However, hackers may be sheltered from prosecution since their country of residence has no laws on cybercrime. The threat of hackers, whether they are gray-hat or black-hat, has been recognized by many countries. New rules and cooperation from countries are emerging. Sensitive information can now reside in all parts of the world in the new global network. Transportation, communication, safety, and public utility systems are tied to the internet and the need for global hacking laws has become necessity.

Global Hacking laws

Numerous countries throughout the world have initiated laws directed at cybercrime. The US has numerous laws on cybercrimes which are outlined in the Computer Crime and Intellectual Property Section (CCIPS) of the Criminal Division of the U.S. Department of Justice. However, in other parts of the world, these types of laws are non-existent. For example, at the time the I Love You virus was released, the Philippines had no laws concerning cybercrimes and Onel De Guzman, who was attributed with creating the virus, was safe from prosecution. The laws in the Philippines have been reformed due to...

Find Another Essay On Gray-Hat Hacking

The Art of Hacking Essay

1237 words - 5 pages community from them. If more cases like this happen people won’t feel safe anymore, fear of using their credit cards. The way it was supposed to be was that credit cards and cards in general were safer to have then to have cash, with the recent hack people will not think that way anymore. Hackers like the ones in the Target issue, do stuff for malicious reasons. Gray Hacking Another issue that has occurred recently in the world of hackers was not

Debating the Motivating Factors for Hackers

1473 words - 6 pages requires system knowledge and skill and is somewhat ‘sexy’ in today’s counterculture, while virus writing is still looked down upon, mostly for its indiscriminate damage and lack of required skill” (Gordon, 2008, para. 6). This researcher agrees and disagrees. Hacking is an admired skill; however, black hat hackers often gain access to systems and networks by utilizing viruses and malware. Sarah was questioned about the stereotype that hackers

Voice Over Internet Protocol Attacks

1082 words - 4 pages ). Understanding voice over internet protocol (voip). Retrieved from http://www.us-cert.gov/reading_room/understanding_voip.pdf Edwards, J. (2007, January 11). Voip scams, phishing, and denial of service attacks. Retrieved from http://www.voip-news.com/feature/voip-scams-phishing-dos-011107/ Harper, Allen; Shon Harris; Jonathan Ness; Chris Eagle; Gideon Lenkey; Terron Williams (2011-01-12). Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Hacking in the 21st Century

2740 words - 11 pages ). The authors of “Gray Hat Hacking” believe that in order to protect the internet from the cyber terrorists of the world society really needs to study their techniques and tactics (Harris, et al. 4). Penetration testing is the ethical hacker’s main tool to keep a network safe, and in actuality the IT professional is trying to break into the network. The reason for this type of attack is to ferret out all the vulnerabilities in the network

Hackers Are Criminals

1299 words - 5 pages Hacking is the practice of changing the features of a system, in order to accomplish a goal outside of the maker’s inventive purpose. These actions may result in someone finding information that does not belong to them and using it to access personal accounts. There are three categories of hackers; black hats, white hats, and gray hats. With regard to this, it depends on the job of the hacker. For instance, black hat hackers are well-known for

Should You Hire a Hacker to Protect Your Computer Systems?

1305 words - 5 pages is often referred to as hacking the code together. Lastly, to hack at something is to break it apart, to make it unusable. It may be difficult for the mainstream media to understand that there are differences between hackers and what they do. The term hacker has been categorized and defined into many subcategories. Hacking is now recognized by the color of the hat a hacker chooses to identify him or herself by. Hackers who are white hats are

Ethics of Full Disclosure of Security Holes

2962 words - 12 pages Approach tells us that certain character traits enable us to act to our highest potential, such as courage, generosity, fidelity. The gray hats which we consider in this argument, are courageous. They risk being arrested for ethical hacking. Ethical hacking, defined from wordspy.com, is “a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system's weaknesses so that they can be repaired.” A security flaw

A Beginner's Guide to Hacking - Part 1

1755 words - 7 pages , however the term 'hacker' in this tutorial will be directly associated with computers.Among hacker ethics, there are two types of hackers: white hats and black hats. Some even consider the 'gray hat', which is in between. A white hat is what a hacker truly i. They are in it for the knowledge, the experience, and because the Internet feels like a real home; like a place where they belong. They feel as though they know everyone on the Internet, even

Expressive Means and Stylistic Devices

9783 words - 39 pages George said; "She put in her thumb and pulled out a plum". Then away we were into our merciless hacking-hecking laughter again. (S.M.Maugham).Mushtipar opalarimiz, fidoyi yanga va singillarymiz tiriklikningtuganmas yumushlary deb o`n besh-yigirma yoshlaridayoq "Qush uyqu", o`ttiz yoshlarida esa o`tin bo`lib qolmoqdalar…(Saodat jurnalidan)In this Uzbek examples mushtipar, fidoyi, yumush, qush uyqu, o`tin is convergence.In English examples we

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium, the thermodynamic concept of Free energy is usually used. For a multi-component system the Gibbs free energy is a function of Pressure, Temperature and quantity (mass, moles) of each component. If one of these parameters is changed, a state change to a more energetically favorable state will occur. This state has the lowest free energy

Similar Essays

The Benefit Of Hacking Essay

1491 words - 6 pages hacking is a skill that is only evil when it is used by evil. The term “hacker” is actually quite vague, because of that people have created terms to make it more specific that oddly revolve around hats. The color of the hat is what defines the hacker and these colors are black, white, gray, and blue. A black hat hacker is the stereotypical bad guy because they lie, cheat, and steal from the innocent for their own personal gain or amusement

The Three Hats Of Hackers Essay

1500 words - 6 pages that these hackers are sub divided into three groups of intermingling individuals classified by a system of hats. This hat system was coined by the L0pht (pronounced “the loft”) one of the most well know old-school hacking group on the internet. This hat system was implemented to give the middle ground hackers, like the members of L0pht, a category to call their own that kept them from being associated with the criminal hackers, also known as

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages those who hack are really hacking or can be described better by other terminology. This essay will also discuss the issues of hacking from a UK legal perspective. Who hacks and why? Those who hack can be split into three generic groups: ‘Black Hat’, ‘White Hats’ and ‘Grey Hats’. Black Hats Black Hats gain unauthorised access to computer systems and networks for malicious purposes. They exploit security weaknesses to promote their own interests, be

Hacking Essay

1769 words - 7 pages Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. In general, hacking or more specifically cracking is not justifiable due to the negative connotations associated with the term. Hackers are generally categorized into three categories, white hat, black or grey hat (Arnone, 2005). White hats are