Hacking usually refers to the unauthorized intrusion into a system, devices or networks; normally carried out by one or more “hackers.” However, a hacker can be anyone around you. They can be an individual like you, me, or the girl next door . They can work alone or be employed by an organization that has the motive to disrupt something or cause havoc–unnecessarily. Often, they look to alter security systems to achieve their goal, which differs from the actual purpose a system.
In other words “a hacker is someone who uses his/her skills to gain
unauthorized access to someone else’s networks, devices
information or data.
There are many type of hacker but usually are broken down into 3 main categories: White, black, and grey that refer to the relationship between the hacker and their methodological.
Black Hat Hackers
The term “black hat” originated from old cowboy movies, where the bad guys usually wore black hats and the good guys wore white hats.
Black-hat hacker attempts to gain unauthorized entry into a devices, system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data.
White Hat Hackers
White-hat hackers, or ethical hackers are deemed to be the good guys, working with companies to improve their information security. A white hat legal permission to engage the targets and to compromise them within the specified rules of engagement.
This individual specializes in ethical hacking tools, techniques, and procedures to secure an organization’s information systems. White-hat hackers will disclose all vulnerability they find in the company’s security system so that it can be fixed before they can be exploited by malicious actors.
Grey Hat Hackers
Grey hats hackers exploit devices, networks and systems much like a black hat hacker do, but without malicious intent, disclosing any gaps and vulnerabilities to companies administrator or law enforcement agencies. Some grey hats may extort the hacked system, offering to correct the defect for a nominal fee.