Topic > The Three Hats of Hackers - 1143

The definition of hacking has undergone some changes in recent years. Initially it identified people "who enjoy modifying and subverting the system, be it technological, bureaucratic or sociological". (Lemos, 2002) Over the past decade, hacking has evolved to describe “those people with a practical interest in computer security and in circumventing that security. (lemos 2002) As you explore deeper into the digital landscape it becomes clearer that these hackers are divided into three groups of intermingled individuals classified by a hat system. This hat system was coined by L0pht (pronounced "the loft") one of the most well-known old-school hacking groups on the Internet. This hat system was implemented to give mid-level hackers, such as L0pht members, a category to define their own that would prevent them from being associated with criminal hackers, also known as black hats, and corporate hackers and maintenance workers. network, known as white hats. (Lemos, 2002) Since black and white constituted the extremes, the middle group composed of both would be considered a gray hat to indicate their neutrality and diversity. Each of these hacking cultures has its own set of alliances, but these alliances do not always remain the same for all hat-class hackers. One of the best examples of this shifting allegiance is the Black Hat hacker. Black hats are known as criminal masterminds, but not all black hats are bad guys. Most black hat hackers simply jump on board and look for challenging systems to break into to test their skills. This skill test results in serious security breaches and ultimately black hats are labeled a threat. Most of their goals typically include hacking systems for personal or financial purposes… middle of paper… ever-evolving technological world of goodies and benefits that surround them. Works Cited ABI Research. “BYOD and Rise in Malware Threats Help Drive Billion-Dollar Mobile Security Services Market to Grow in 2013.” BYOD and Rise in Malware Threats Help Grow Billion-Dollar Mobile Security Services Market in 2013. Allied Business Intelligence, Inc., March 29, 2013. Web. April 19, 2014. .Lemos, Robert. “The new law makes hacking a black and white choice.” CNET.com. CBS Interactive Inc, September 23, 2002. Web. April 19, 2014. .Olson, Parmy. “Your smartphone is the next big target for hackers.” CNN. Cable News Network, August 26, 2013. Web. April 19. 2013. .