White hat (computer security)

white hatethical hackingwhite hat hackerethical hackerwhite-hat hackerhackerwhite hat hackingwhite hat hackerswhite hatswhite-hat
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.wikipedia
154 Related Articles

Hacker ethic

Hackinghacker ethicsethical hacker
Ethical hacking is a term meant to imply a broader category than just penetration testing.
However, Levy's hacker ethic has often arguably been quoted out of context and misunderstood as a reference to hacking, as in breaking into computers, and thus many sources imply that hacker ethic is describing the ideals of white-hat hackers.

Hacker

hackinghackerscomputer hacker
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.
Further terms such as "black hat", "white hat" and "gray hat" developed when laws against breaking into computers came into effect, to distinguish criminal activities from those activities which were legal.

Security hacker

hackerhackinghackers
White hat hackers may also work in teams called "sneakers", red teams, or tiger teams.
and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).

Grey hat

gray hatgray-hatgrey
While a white hat hacker hacks under good intentions with permission, and a black hat hacker has malicious intent, there is a third kind known as a grey hat hacker who hacks with good intentions without permission.
The term began to be used in the late 1990s, derived from the concepts of "white hat" and "black hat" hackers.

Black hat (computer security)

black hatblack hat hackerblack hat hacking
Contrasted with black hat, a malicious hacker, the name comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.
The term's origin is often attributed to hacker culture theorist Richard Stallman (though he denies coining it) to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.

Red team

redRed Teamingred teams
White hat hackers may also work in teams called "sneakers", red teams, or tiger teams.
When used in a computer security context, a red team is a group of white-hat hackers that attack an organization's digital infrastructure as an attacker would in order to test the organization's defenses (often known as "penetration testing").

Black and white hat symbolism in film

Banditblack and white hatsblack hat
Contrasted with black hat, a malicious hacker, the name comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.
This convention gave rise to the terms black hat and white hat to refer to malicious and ethical hackers respectively.

MalwareMustDie

malware
MalwareMustDie, NPO as a whitehat security research workgroup, has been launched from August 2012.

Certified Ethical Hacker

CEHCertified Network Defense ArchitectEthical Hacking
Ethical hackers are employed by organizations to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities.

Vulnerability (computing)

vulnerabilitiesvulnerabilitysecurity vulnerabilities
These methods identify and exploit known security vulnerabilities and attempt to evade security to gain entry into secured areas.
Penetration test is a form of verification of the weakness and countermeasures adopted by an organization: a White hat hacker tries to attack an organization's information technology assets, to find out how easy or difficult it is to compromise the IT security.

Wireless identity theft

contactless' credit card readers
Academic researchers and ‘White-Hat’ hackers have analysed and documented the covert theft of RFID credit card information and been met with both denials and criticisms from RFID card-issuing agencies.

Internet slang

netspeakInternet jargonChat language
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

Computer security

cybersecuritycyber securitysecurity
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

Penetration test

penetration testingpenetration testerApplication Penetration Testing
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

Information system

information systemscomputer information systemssystems
The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

Western (genre)

Westernwestern filmWesterns
Contrasted with black hat, a malicious hacker, the name comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat respectively.

Tiger team

tiger teams
White hat hackers may also work in teams called "sneakers", red teams, or tiger teams.

United States Air Force

U.S. Air ForceAir ForceUSAF
One of the first instances of an ethical hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems was tested for "potential use as a two-level (secret/top secret) system."

Multics

Multics operating systemMultics project
One of the first instances of an ethical hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems was tested for "potential use as a two-level (secret/top secret) system."

United States Armed Forces

United States militaryU.S. militaryUS military
There are several other now unclassified reports describing ethical hacking activities within the US military.

The New York Times

New York TimesNY TimesNYT
By 1981 The New York Times described white hat activities as part of a "mischievous but perversely positive 'hacker' tradition".

National CSS

When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner.

Password cracking

password crackercrackingpassword recovery
When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner.

Dan Farmer

The idea to bring this tactic of ethical hacking to assess security of systems was formulated by Dan Farmer and Wietse Venema.

Wietse Venema

The idea to bring this tactic of ethical hacking to assess security of systems was formulated by Dan Farmer and Wietse Venema.