Share to: share facebook share twitter share wa share telegram print page

Security hacker

A security hacker is a person who looks for ways to break or bypass defenses in a computer system or computer network.[1] People hack for money, protest, challenge, fun, research, or to make systems stronger.[2]

There is long debate about the word hacker. Some programmers say a hacker is just someone who knows computers very well, and that cracker should be used for people who break into systems.[3] However, in common media use, hacker often means someone who breaks into computers in a bad way.[4]

History

Bruce Sterling, author of The Hacker Crackdown

1960s–1980s

Hacker culture started in the 1960s with phreaking (telephone hacking). It grew in the 1980s with BBS communities. Magazines like 2600: The Hacker Quarterly and online groups like alt.2600 became part of this culture.

In 1982, the film Tron used the word "hacking". In 1983, WarGames made many people think teenage hackers could be a danger to national security. That same year, a group called The 414s from Milwaukee broke into important computer systems, including Los Alamos National Laboratory and banks.[5] The U.S. government soon started working on laws against computer hacking and held hearings about the problem.[6] By the late 1980s, the Morris worm and books like The Cuckoo's Egg made the word hacker widely linked to computer crime.

Classifications

In computer security, people often talk about different "hat colors":

White hat

A white hat hacker (ethical hacker) uses hacking to test systems and improve security for owners or clients.[7]

Black hat

A black hat hacker breaks into systems for personal gain or to cause damage.[8]

Grey hat

A grey hat is between white and black. They may break in without permission to show problems or ask for a reward to fix them. This can still be illegal or unethical in many places.[9]

Script kiddie

A script kiddie uses ready-made tools written by others and may not fully understand how they work.[10]

Other groups

  • Crackers – people who break into computers for crime or to cause harm.[11]
  • Elite hackers – very skilled hackers who find new exploits.
  • Neophytes – new or inexperienced hackers.
  • Blue hat – people invited to test systems before release.
  • Hacktivists – hackers who promote political or social causes.
  • Nation state hackers – hackers working for governments.
  • Criminal gangs – organized groups that do cybercrime for profit.

References

  1. Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements". Annals of Operations Research. 235: 277–300. doi:10.1007/s10479-015-1925-2.
  2. Winkler, Ira. Spies Among Us. John Wiley & Sons, 2005. ISBN 9780764589904.
  3. "Jargon File: Cracker". Archived from the original on 29 June 2011. Retrieved 8 May 2010.
  4. Yagoda, Ben (6 March 2014). "A Short History of 'Hack'". The New Yorker. {{cite magazine}}: |access-date= requires |url= (help); |archive-url= requires |url= (help)
  5. Elmer-DeWitt, Philip (29 August 1983). "The 414 Gang Strikes Again". Time. p. 75. {{cite news}}: |archive-date= requires |archive-url= (help)
  6. "Timeline: The U.S. Government and Cybersecurity". The Washington Post. 16 May 2003. {{cite news}}: |archive-date= requires |archive-url= (help)
  7. Caldwell, Tracey (22 July 2011). "Ethical hackers: putting on the white hat". Network Security. 2011 (7): 10–13. doi:10.1016/S1353-4858(11)70075-7.
  8. Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.
  9. Okpa, John Thompson; Ugwuoke, Christopher U. (2022). "Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations...". SAGE Open. doi:10.1177/21582440221122739.
  10. Andress, Mandy (2001). CIW Security Professional. Wiley. p. 638. ISBN 0-7645-4822-0.
  11. Clifford, Ralph D. (2011). Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime. Carolina Academic Press. ISBN 978-1594608537.

Other websites

Kembali kehalaman sebelumnya