15 hackers

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

Black hat hackers

are your stereotypical cybercriminals.

2
New cards

Black hat hackers

They work

seemingly nonstop to hack into personal devices and networks in

search of sensitive data they can steal and use to make a profit

3
New cards

Black hat hackers

are experts in launching malware, such as ransomware and

spyware attacks — anything to get their hands on the information

4
New cards

Black hat hacker motivation + goals

Steal personal information to use

and/or sell to make a profit.

5
New cards

Anyone

Black potential targets

6
New cards

White hat hackers

have the same skills as black hat hackers, but a different

motivation: to break into systems (with permission) to find security flaws.

7
New cards

White hat hackers

They generally do this to help governments and businesses identify

vulnerabilities in internal systems to avoid cyberattacks.

8
New cards

White hat hackers

are employed by the very institutions they aim to help

9
New cards

White hat hacker motivation + goals

Spot security flaws that ill-intentioned

hackers could use to their advantage.

10
New cards

Black hat hackers

Potential targets of white hat

11
New cards

Gray hat hackers

make a hobby of finding gaps in security networks

and usually let the network admins know if they found a vulnerability.

12
New cards

Gray hat hackers

a controversial practice that blurs the line between ethical and malicious hacking. Though the motivation for hacking is often neutral (or even

positive),

13
New cards

Gray hat hackers

this type of hacker can frustrate institutions because they

havenʼt given the hackers explicit permission to go hunting for security

flaws.

14
New cards

Gray hat hacker motivation + goals

Hack private networks to spot

security flaws, often to try to improve system security out of their own

curiosity.

15
New cards

Businesses and other large organizations

Gray hat hackersPotential targets

16
New cards

Red hat hackers

are similar to white hat hackers

17
New cards

Red hat hackers

instead of being

hired by businesses or governments to find and fix vulnerabilities, they

take a vigilante approach to directly stop black hats in their track

18
New cards

Robin Hood hackers

red hat hackers nickname

19
New cards

Red hat hackers

may collectively target large-scale scamming

operations, which use spear phishing, scareware, or other social

engineering hacks to exploit victims.

20
New cards

Red hat hackers

hack into scammer

networks and devices to disrupt their activities, sometimes even using

malware to take them offline for days or weeks at a time.

21
New cards

Red hat hacker motivation + goals

Stop black hat hacker cyberattacks

in (almost) any way possible.

22
New cards

Black hat hackers

red hat hackers potential targets

23
New cards

Green hat hackers

are considered hackers-in-training.

24
New cards

Green hat hackers

They often work

under a mentor, who guides them on their path becoming

independently proficient.

25
New cards

Green hat hackers

Their motivations for joining the hacking world

vary, and they may eventually choose to pursue any number of hacking

types.

26
New cards

Green hat hackers

Unfortunately, their inexperience can sometimes have dangerous

consequences.

27
New cards

Green hat hacker motivation + goals

Find a hacker they can learn

from to one day become a full-fledged hacker.

28
New cards

Everyday people and businesses

Green hat hackers potential targets

29
New cards

Script kiddies

are true

amateurs.

30
New cards

Script kiddies

They rely on pre-existing programs because they donʼt have the

experience or knowledge it takes to create their own.

31
New cards

Script kiddies

They rely on pre-existing programs because they donʼt have the

experience or knowledge it takes to create their own.

32
New cards

Script kiddies

Because they lack

technical knowledge, they often donʼt understand the potentially dangerous

consequences of using pre-written scripts

33
New cards

Script kiddie hacker motivation + goals

Use existing programs to break into

personal devices to wreak havoc and/or make a profit off stolen information.

34
New cards

Everyday people and businesses

Script kiddie Potential targets

35
New cards

Blue hat hackers

closely resemble ethical white hat hackers

36
New cards

Blue hat hackers

instead

of breaking into systems or software that a business is already using, a

business gives the blue hacker access beforehand to test it for security

flaws

37
New cards

Blue hat hackers

the organization can lower the potential risk before

deciding to change or update current systems

38
New cards

Blue hat hackers

a company wants to implement a new file-sharing system. The

last thing they want is for hackers to easily break in and compromise

their confidential data. So, they contract a hacker to test the system

before making a final decision

39
New cards

Blue hat hacker motivation + goals

Test software for security flaws

before businesses commit to changing their systems.

40
New cards

Black hat hackers

Blue hat hacker potential targets

41
New cards

Elite hackers

are the champions of modern-day hacking.

42
New cards

Elite hackers

Their years of

experience put them at the top of their field

43
New cards

Elite hackers

and they can choose to

wear a black or white hacker hat depending on the day. Because they

can do both so easily

44
New cards

Elite hackers

theyʼre often the first to identify and create the

newest cyberattack methods.

45
New cards

Elite hacker motivation + goal

Financial gain or ethically spotting

cybersecurity flaws, depending on the hat theyʼre wearing.

46
New cards

Everyday people and businesses

Potential targets elite hacker

47
New cards

Gaming hackers

target any video game enthusiast in their line of sight.

48
New cards

Gaming hackers

Theyʼre known for using

the latest video game trends to manipulate online players into revealing login credentials,

payment information, and other personal details attached to their accounts.

49
New cards

Gaming hackers

may also use their hacking skills to cheat in games by gaining unfair advantages, such as

unlimited resources, invincibility, or wallhacks to see through obstacles

50
New cards

Gaming hackers

can come in all shapes and sizes. For example, the iconic cheat code from the

original The Sims game, “rosebud;!;!;!;!;!ˮ, which was used to generate endless amounts of

in-game currency

51
New cards

Gaming hacker motivation + goals

Trick gamers into revealing sensitive information to profit

from their stolen data, or purposefully undermine the rules of a game.

52
New cards

Online gamers

Potential targets gaming hacker

53
New cards

Cryptojacker

involves hacking into someoneʼs devices and covertly

taking over their computing power for the sole purpose of mining

cryptocurrency

54
New cards

Cryptojacker motivation + goals

Hijack unsuspecting usersʼ

processing power to mine cryptocurrency.

55
New cards

Cryptocurrency enthusiasts

Potential targetsCryptojacker 

56
New cards

Whistleblowers

expose or report corporate malfeasance or criminal

activity, especially by the companies they work fo

57
New cards

Whistleblowers

may

not have a ton of hacking experience, but they use what they do know

to expose crime and corporate or governmental malpractice

58
New cards

Whistleblower motivation + goals

Expose or report corporate

malfeasance or criminal activity using insider access.

59
New cards
60
New cards

Untrustworthy businesses or individuals

Potential targets whistleblowers

61
New cards

State-sponsored hackers

are the James Bonds of the hacking community.

62
New cards

State-sponsored hackers

Government agencies hire these individuals to gain confidential data on

other foreign countries to help them manage potential and existing threats.

63
New cards

State-sponsored hacker motivation + goals

Hack into private international

networks under the order of government organizations.

64
New cards

International government agencies and other high-profile institutions

State-sponsored hackers potential targets

65
New cards

Malicious insiders

aren't concerned with honesty and justice like

whistleblowers.

66
New cards

Malicious insiders

They intentionally break into their own company networks

to exploit confidential data that could put the company and its customers at

risk

67
New cards

Malicious insiders

The information they expose could just put a pretty penny in

their pocket if they find the right interested party.

This might occur when an employee receives a tempting offer to steal

private corporate files in exchange for small or large payments.

68
New cards

Malicious insiders

The second

employees access the network for the purpose of siphoning private data,

they become

69
New cards

Malicious insider motivation + goals

Expose and/or exploit sensitive company data

to make a personal profit.

70
New cards

Businesses, particularly the hackerʼs employer

potential targets Malicious insiders

71
New cards