White hat (computer security)

A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker.[1][2] Ethical hacking is a term meant to imply a broader category than just penetration testing.[3][4] Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has.[5] The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively.[6] There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.[7]

White-hat hackers may also work in teams called "sneakers and/or hacker clubs",[8] red teams, or tiger teams.[9]

History

One of the first instances of an ethical hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems were tested for "potential use as a two-level (secret/top secret) system." The evaluation determined that while Multics was "significantly better than other conventional systems," it also had "... vulnerabilities in hardware security, software security and procedural security" that could be uncovered with "a relatively low level of effort."[10] The authors performed their tests under a guideline of realism, so their results would accurately represent the kinds of access an intruder could potentially achieve. They performed tests involving simple information-gathering exercises, as well as outright attacks upon the system that might damage its integrity; both results were of interest to the target audience. There are several other now unclassified reports describing ethical hacking activities within the US military.

By 1981 The New York Times described white-hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a National CSS employee revealed the existence of his password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated "The Company realizes the benefit to NCSS and encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files".[11]

On October 20, 2016, the Department of Defense (DOD) announced "Hack The Pentagon."[12][13]

The idea to bring this tactic of ethical hacking to assess the security of systems and point out vulnerabilities was formulated by Dan Farmer and Wietse Venema. To raise the overall level of security on the Internet and intranets, they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program called Security Administrator Tool for Analyzing Networks, or SATAN, was met with a great amount of media attention around the world in 1992.[9]

Tactics

While penetration testing concentrates on attacking software and computer systems from the start – scanning ports, examining known defects in protocols and applications running on the system, and patch installations, for example – ethical hacking may include other things. A full-scale ethical hack might include emailing staff to ask for password details, rummaging through executive dustbins, usually without the knowledge and consent of the targets. Only the owners, CEOs, and Board Members (stakeholders) who asked for such a security review of this magnitude are aware. To try and replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical.[14] In most recent cases these hacks perpetuate for the long-term con (days, if not weeks, of long-term human infiltration into an organization). Some examples include leaving USB/flash key drives with hidden auto-start software in a public area as if someone lost the small drive and an unsuspecting employee found it and took it.

Some other methods of carrying out these include:

The methods identified exploit known security vulnerabilities and attempt to evade security to gain entry into secured areas. They can do this by hiding software and system 'back-doors' that can be used as a link to information or access that a non-ethical hacker, also known as 'black hat' or 'grey hat', may want to reach.

Legality

Belgium

Belgium legalized white hat hacking in February 2023.[15]

China

In July 2021, the Chinese government moved from a system of voluntary reporting to one of legally mandating that all white hat hackers first report any vulnerabilities to the government before taking any further steps to address the vulnerability or make it known to the public.[16] Commentators described the change as creating a "dual purpose" in which white hat activity also serves the country's intelligence agencies.[16]

United Kingdom

Struan Robertson, legal director at Pinsent Masons LLP, and editor of OUT-LAW.com says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offense under the Computer Misuse Act. The unauthorized access offense covers everything from guessing the password to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe."[4]

Employment

The United States National Security Agency offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.[8] When the agency recruited at DEF CON in 2020, it promised applicants that "If you have a few, shall we say, indiscretions in your past, don't be alarmed. You shouldn't automatically assume you won't be hired".[17]

A good "white hat" is a competitive skillful employee for an enterprise since they can be a countermeasure to find the bugs to protect the enterprise network environment. Therefore, a good "white hat" could bring unexpected benefits in reducing the risk across systems, applications, and endpoints for an enterprise.[18]

Recent research has indicated that white-hat hackers are increasingly becoming an important aspect of a company's network security protection. Moving beyond just penetration testing, white hat hackers are building and changing their skill sets, since the threats are also changing. Their skills now involve social engineering, mobile tech, and social networking.[19]

Notable people

See also

References

  1. ^ "What is white hat? - a definition from Whatis.com". Searchsecurity.techtarget.com. Archived from the original on 2011-02-01. Retrieved 2012-06-06.
  2. ^ Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (2022-09-05). "Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria". SAGE Open. 12 (3): 215824402211227. doi:10.1177/21582440221122739. ISSN 2158-2440. S2CID 252096635.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  3. ^ Ward, Mark (14 September 1996). "Sabotage in cyberspace". New Scientist. 151 (2047). Archived from the original on 13 January 2022. Retrieved 28 March 2018.
  4. ^ a b Knight, William (16 October 2009). "License to Hack". InfoSecurity. 6 (6): 38–41. doi:10.1016/s1742-6847(09)70019-9. Archived from the original on 9 January 2014. Retrieved 19 July 2014.
  5. ^ Filiol, Eric; Mercaldo, Francesco; Santone, Antonella (2021). "A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach". Procedia Computer Science. 192: 2039–2046. doi:10.1016/j.procs.2021.08.210. S2CID 244321685.
  6. ^ Wilhelm, Thomas; Andress, Jason (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Elsevier. pp. 26–7. ISBN 978-1-59749-589-9.
  7. ^ "What is the difference between black, white, and grey hackers". Norton.com. Norton Security. Archived from the original on 15 January 2018. Retrieved 2 October 2018.
  8. ^ a b "What is a White Hat?". Secpoint.com. 2012-03-20. Archived from the original on 2019-05-02. Retrieved 2012-06-06.
  9. ^ a b Palmer, C.C. (2001). "Ethical Hacking" (PDF). IBM Systems Journal. 40 (3): 769. doi:10.1147/sj.403.0769. Archived (PDF) from the original on 2019-05-02. Retrieved 2014-07-19.
  10. ^ Paul A. Karger; Roger R. Scherr (June 1974). MULTICS SECURITY EVALUATION: VULNERABILITY ANALYSIS (PDF) (Report). Archived (PDF) from the original on 13 November 2017. Retrieved 12 Nov 2017.
  11. ^ McLellan, Vin (1981-07-26). "Case of the Purloined Password". The New York Times. Archived from the original on 2016-03-07. Retrieved 11 August 2015.
  12. ^ "DoD Announces 'Hack the Pentagon' Follow-Up Initiative". U.S. Department of Defense. Retrieved 2023-12-15.
  13. ^ Perez, Natasha Bertrand,Zachary Cohen,Alex Marquardt,Evan (2023-04-13). "Pentagon leak leads to limits on who gets access to military's top secrets | CNN Politics". CNN. Archived from the original on 2023-12-15. Retrieved 2023-12-15.{{cite web}}: CS1 maint: multiple names: authors list (link)
  14. ^ Justin Seitz, Tim Arnold (April 14, 2021). Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters. No Starch Press. ISBN 978-1-7185-0112-6. Archived from the original on August 26, 2021. Retrieved August 30, 2021.
  15. ^ Drechsler, Charlotte Somers, Koen Vranckaert, Laura (3 May 2023). "Belgium legalises ethical hacking: a threat or an opportunity for cybersecurity?". CITIP blog. Archived from the original on 17 May 2023. Retrieved 7 May 2023.{{cite web}}: CS1 maint: multiple names: authors list (link)
  16. ^ a b Brar, Aadil (18 January 2024). "China Raises Private Hacker Army To Probe Foreign Governments". Newsweek. Archived from the original on 20 January 2024. Retrieved 20 January 2024.
  17. ^ "Attention DEF CON® 20 attendees". National Security Agency. 2012. Archived from the original on 2012-07-30.
  18. ^ Caldwell, Tracey (2011). "Ethical hackers: putting on the white hat". Network Security. 2011 (7): 10–13. doi:10.1016/s1353-4858(11)70075-7. ISSN 1353-4858.
  19. ^ Caldwell, Tracey (2011-07-01). "Ethical hackers: putting on the white hat". Network Security. 2011 (7): 10–13. doi:10.1016/S1353-4858(11)70075-7. ISSN 1353-4858.

Read other articles:

Nepenthes kampotiana Kantong bawah N. kampotiana Klasifikasi ilmiah Kerajaan: Plantae (tanpa takson): Angiospermae (tanpa takson): Eudikotil (tanpa takson): Inti eudikotil Ordo: Caryophyllales Famili: Nepenthaceae Genus: Nepenthes Nama binomial Nepenthes kampotianaLecomte (1909) Sinonim Sinonim Nepenthes geoffrayiLecomte (1909) Heterokresonim Nepenthes kampotianaauct. non Lecomte: Hort. ex Hort.Bot.Berlin in sched. (1996) [=N. mirabilis][1] Nepenthes kampotiana adalah spesies ka...

 

 

  لمعانٍ أخرى، طالع المحرم (توضيح).   هذه المقالة عن شهر محرم الهجري. لمعانٍ أخرى، طالع محرم (توضيح). <<محرم - 1445 هـ>>السبتالأحدالاثنينالثلاثاءالأربعاءالخميسالجمعة2715 يوليو 2023 2816 يوليو 2023 2917 يوليو 2023 3018 يوليو 2023 119 يوليو 2023 220 يوليو 2023 321 يوليو 2023 422 يوليو 2023 523 يول...

 

 

Thyroid follicular cellSection of thyroid gland of sheep. X 160. (Cubical epithelium labeled at center left.)DetailsSystemEndocrine systemLocationThyroid glandFunctionproduction and secretion of thyroid hormones thyroxine (T4) and triiodothyronine (T3).IdentifiersTHH3.08.02.4.00007 FMA68782Anatomical terms of microanatomy[edit on Wikidata] Thyroid follicular cells (also called thyroid epithelial cells or thyrocytes[1]) are the major cell type in the thyroid gland, and are responsi...

Edward Pellew, Viscount Exmouth ke-1Edward Pellew, Viscount Exmouth ke-1Lahir(1757-04-19)19 April 1757Dover, InggrisMeninggal23 Januari 1833(1833-01-23) (umur 75)Teignmouth, Devon, InggrisPengabdian Britania RayaDinas/cabang Angkatan Laut Kerajaan InggrisLama dinas1770 – 1820PangkatLaksamanaKomandanPangkalan Hindia TimurArmada MediteraniaPanglima Tertinggi, PlymouthPerang/pertempuranPerang Kemerdekaan AmerikaPerang Revolusi PrancisPeperangan era NapoleonPerang Barbaria KeduaPengha...

 

 

Union Army officer in the American Civil War Leopold von GilsaBorn1824Erfurt, GermanyDied(1870-03-01)March 1, 1870New York CityPlace of burialGreen-Wood Cemetery BrooklynAllegiance United States of AmericaUnionService/branchUnion ArmyYears of service1861–1865Rank ColonelUnitArmy of the PotomacCommands heldVon Gilsa's Brigade, XI CorpsBattles/warsAmerican Civil War Battle of Cross Keys Battle of Chancellorsville Battle of Gettysburg Other workSoldier in the Prussian Army,Singe...

 

 

Masjid Biru di Istanbul, Turki. Bagian dari seriIslam Rukun Iman Keesaan Allah Malaikat Kitab-kitab Allah Nabi dan Rasul Allah Hari Kiamat Qada dan Qadar Rukun Islam Syahadat Salat Zakat Puasa Haji Sumber hukum Islam al-Qur'an Sunnah (Hadis, Sirah) Tafsir Akidah Fikih Syariat Sejarah Garis waktu Muhammad Ahlulbait Sahabat Nabi Khulafaur Rasyidin Khalifah Imamah Ilmu pengetahuan Islam abad pertengahan Penyebaran Islam Penerus Muhammad Budaya dan masyarakat Akademik Akhlak Anak-anak Dakwah Demo...

Upper Austria Ladies Linz 2020 Sport Tennis Data 9 novembre – 15 novembre Edizione 34ª Categoria International Superficie Cemento indoor Montepremi $ 225 500 Località Linz, Austria Impianto TipsArena Linz Campioni Singolare Aryna Sabalenka Doppio Arantxa Rus / Tamara Zidanšek 2019 2021 L'Upper Austria Ladies Linz 2020 è stato un torneo di tennis giocato sul cemento indoor. È stata la 34ª edizione dell'Upper Austria Ladies Linz, che fa parte della categoria WTA International ...

 

 

この記事は検証可能な参考文献や出典が全く示されていないか、不十分です。出典を追加して記事の信頼性向上にご協力ください。(このテンプレートの使い方)出典検索?: コルク – ニュース · 書籍 · スカラー · CiNii · J-STAGE · NDL · dlib.jp · ジャパンサーチ · TWL(2017年4月) コルクを打ち抜いて作った瓶の栓 コルク(木栓、�...

 

 

Artikel ini perlu dikembangkan agar dapat memenuhi kriteria sebagai entri Wikipedia.Bantulah untuk mengembangkan artikel ini. Jika tidak dikembangkan, artikel ini akan dihapus. artikel ini perlu dirapikan agar memenuhi standar Wikipedia. Tidak ada alasan yang diberikan. Silakan kembangkan artikel ini semampu Anda. Merapikan artikel dapat dilakukan dengan wikifikasi atau membagi artikel ke paragraf-paragraf. Jika sudah dirapikan, silakan hapus templat ini. (Pelajari cara dan kapan saatnya untu...

  لمعانٍ أخرى، طالع ميت العز (توضيح). ميت العز  -  قرية مصرية -  تقسيم إداري البلد  مصر المحافظة محافظة الدقهلية المركز ميت غمر المسؤولون السكان التعداد السكاني 4599 نسمة (إحصاء 2006) معلومات أخرى التوقيت ت ع م+02:00  تعديل مصدري - تعديل   قرية ميت العز هي إحدى ال...

 

 

日本 > 栃木県 > 宇都宮市 > 豊郷台 豊郷台 町[1] 帝京大学宇都宮キャンパス本部棟1号館 豊郷台豊郷台の位置 北緯36度36分16.2秒 東経139度53分07.8秒 / 北緯36.604500度 東経139.885500度 / 36.604500; 139.885500国 日本都道府県 栃木県市 宇都宮市地区 豊郷地区[2]町名制定 1990年8月1日[3]面積[4] • 合計 1.08 km2標高 156 ...

 

 

These are tables of congressional delegations from New York to the United States House of Representatives and the United States Senate. The current dean of the New York delegation is Senator and Senate Majority Leader Chuck Schumer, having served in the Senate since 1999 and in Congress since 1981. United States Senate Main article: List of United States senators from New York Current U.S. senators from New York New York CPVI (2022):[1] D+10 Class I senator Class III senator Kirsten ...

Sand- to boulder-sized particle of debris in the Solar System Meteor redirects here. For other uses, see Meteor (disambiguation). A meteoroid shown entering the atmosphere, causing a visible meteor and hitting the Earth's surface, becoming a meteorite A meteoroid (/ˈmiːtiərɔɪd/ MEE-tee-ə-royd)[1] is a small rocky or metallic body in outer space. Meteoroids are distinguished as objects significantly smaller than asteroids, ranging in size from grains to objects up to a meter wide...

 

 

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Perceraian film – berita · surat kabar · buku · cendekiawan · JSTOR PerceraianSutradaraAbdi WiyonoProduserHendrick GozaliDitulis olehHendrick GozaliPemeranAyu AzhariChris SalamDhaliaEddy RiwantoEmma...

 

 

Lithuanian footballer Arvydas Novikovas Novikovas playing for Heart of MidlothianPersonal informationDate of birth (1990-12-18) 18 December 1990 (age 33)Place of birth Vilnius, LithuaniaHeight 1.79 m (5 ft 10 in)Position(s) WingerTeam informationCurrent team TuzlasporNumber 18Senior career*Years Team Apps (Gls)2006 FC Vilnius-2 (4)2007 → Interas (loan) 12 (0)2008 FC Vilnius 18 (0)2008–2013 Heart of Midlothian 65 (6)2011 → St Johnstone (loan) 6 (0)2013–2015 Erzgebir...

Town and municipality in Republika Srpska, Bosnia and HerzegovinaKalinovik КалиновикTown and municipalityView on Kalinovik Coat of armsLocation of Kalinovik within Bosnia and HerzegovinaCoordinates: 43°30′15″N 18°26′48″E / 43.50417°N 18.44667°E / 43.50417; 18.44667Country Bosnia and HerzegovinaEntity Republika SrpskaGovernment • Municipal mayorRadomir Sladoje (SNSD) • Municipality681.15 km2 (262.99 s...

 

 

Chinese rapper (born 1991) In this Chinese name, the family name is Zhang. This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) A major contributor to this article appears to have a close connection with its subject. It may require cleanup to comply with Wikipedia's content policies, particularly neutral point of view. Please discuss further on the talk page. (May 2023) (Learn how and when to ...

 

 

Greenlandic political party Cooperation Party SuleqatigiissitsisutDanish nameSamarbejdspartietChairmanMichael Rosing[1]Deputy ChairmanTillie Martinussen[1]Founded11 March 2018 (2018-03-11)[2]Split fromDemocratsIdeologyGreenlandic unionism[3]Liberalism[4]Economic liberalism[3]Political positionCentre-right[2]Nordic Council affiliationCentre GroupColors  PurpleInatsisartut0 / 31Folketing(Greenland seats)0 / 2W...

Alejandro Landes Echavarría Información personalNacimiento 1980Sao Paulo, BrasilNacionalidad Colombiana y ecuatorianaEducaciónEducado en Universidad Brown Información profesionalOcupación Director de cine, productor, guionista[editar datos en Wikidata] Alejandro Landes Echavarría (São Paulo, 1980) es un director de cine, productor, guionista y periodista colombiano. Es principalmente conocido por dirigir películas en español como Porfirio, un drama colombiano basado en una ...

 

 

Corunna redirects here. For other uses, see A Coruña (disambiguation) and Corunna (disambiguation). Municipality in Galicia, SpainA Coruña A Coruña (Galician) La Coruña (Spanish)MunicipalityA CoruñaCity hallTower of HerculesGlass galleries SealCoat of armsNickname: A Cidade de Cristal (The Glass City)Motto(s): A Coruña, a cidade onde ninguén é forasteiro (A Coruña, the city where nobody is an outsider)Location of A CoruñaA CoruñaShow map of GaliciaA CoruñaShow ...