Hacker (computer security)
From Wikipedia, the free encyclopedia
(Redirected from Cracker (computer security))
This article is part of a series on |
Computer hacking |
---|
History |
Hacker ethic |
Computer crime |
Hacking tools |
Malware |
Computer security |
Groups |
Contents
History
Further information: Timeline of computer security hacker history
Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement that published the Technological Assistance Program (TAP) newsletter.[citation needed] TAP was a phone phreaking
newsletter that taught techniques for unauthorized exploration of the
telephone network. Many people from the phreaking community are also
active in the hacking community even today, and vice versa.[citation needed]Classifications
Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with whom they do not agree.Eric S. Raymond, author of The New Hacker's Dictionary, advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as a wider hacker culture, a view that Raymond has harshly rejected. Instead of a hacker/cracker dichotomy, they emphasize a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity.
According to Ralph D. Clifford, a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system".[6] These subgroups may also be defined by the legal status of their activities.[7]
White hat
Main article: White hat
A white hat hacker
breaks security for non-malicious reasons, perhaps to test their own
security system or while working for a security company which makes
security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council,[8]
also known as the International Council of Electronic Commerce
Consultants, is one of those organizations that have developed
certifications, courseware, classes, and online training covering the
diverse arena of ethical hacking.[7]Black hat
Main article: Black hat
A "black hat" hacker is a hacker who "violates computer security for
little reason beyond maliciousness or for personal gain" (Moore, 2005).[9]
Black hat hackers form the stereotypical, illegal hacking groups often
portrayed in popular culture, and are "the epitome of all that the
public fears in a computer criminal".[10]
Black hat hackers break into secure networks to destroy, modify, or
steal data; or to make the network unusable for those who are authorized
to use the network. Black hat hackers are also referred to as the
"crackers" within the security industry and by modern programmers.
Crackers keep the awareness of the vulnerabilities to themselves and do
not notify the general public or the manufacturer for patches to be
applied. Individual freedom and accessibility is promoted over privacy
and security. Once they have gained control over a system, they may
apply patches or fixes to the system only to keep their reigning
control. Richard Stallman invented the definition to express the
maliciousness of a criminal hacker versus a white hat hacker who
performs hacking duties to identify places to repair.[11]Grey hat
Main article: Grey hat
A grey hat hacker lies between a black hat and a white hat hacker. A
grey hat hacker may surf the Internet and hack into a computer system
for the sole purpose of notifying the administrator that their system
has a security defect, for example. They may then offer to correct the
defect for a fee.[10]
Grey hat hackers sometimes find the defect of a system and publish the
facts to the world instead of a group of people. Even though grey hat
hackers may not necessarily perform hacking for their personal gain,
unauthorized access to a system can be considered illegal and unethical.Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.[12]Script kiddie
A script kiddie (also known as a skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),[13] usually with little understanding of the underlying concept.Neophyte
A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.[10]Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.[14][15][16]Hacktivist
A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.Hacktivism can be divided into two main groups:
- Cyberterrorism — Activities involving website defacement or denial-of-service attacks; and,
- Freedom of information — Making information that is not public, or is public in non-machine-readable formats, accessible to the public.
No comments:
Post a Comment