Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
5 Sources
Style:
Other
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

The Black, White, and Grey Hat Hacking

Research Paper Instructions:

-IEEE research paper
-IEEE format for sources
- topic of your choice. (I pick hacking. I would like it to be about white hat, grey hat and black hat hackers)
-You need 5 different sources in total.
-Add in-text citations as you write to give credit to the sources on the References List.
-Create References List
-Create title page
-Use IEEE

Research Paper Sample Content Preview:

Hacking:

Black, White, and Grey Hacking

Abstract— Organizations and individuals alike have been victims of hacking and cybercrime activities. In most cases, the world gets to hear of the harm and disruption that hacking brought about by hacking. However, what few know is that there are different types of hacking and that there is a good side to hacking. The hacking that most people have been exposed to through personal experiences, news outlets, and movies is known as black hat hacking. This type of hacking seeks to extort, harm, disrupt, and steal. However, there is also white hat hacking and grey white hacking. White hat hacking is done to bring about positive change by showcasing the loopholes that black hat hackers can use to exploit victims. Further, it is crucial to note that white hat hacking is permitted, and the intrusions are therefore legal. Like white hat hacking, grey hat hacking seeks to expose loopholes or security mishaps that black hat hackers can exploit. However, grey hat hackers are not permitted, and therefore their hacking is illegal.

 

Keywords—Hacking, Black Hat Hacking, White Hat Hacking, Grey Hat Hacking I.     Introduction The word hacking leaves a sour taste in the mouth of individuals and companies alike. As recently as 2021 July, the world woke up to the news that Saudi Aramco was being extorted for millions of dollars over leaked data [1]. Such reports, among others, often leave people scared of hackers and their goal of earning money through the exploitation of individuals’ and organizations’ vulnerabilities. Cases of extortion, identity theft, data breaches, malicious damage, and the loss or modification of sensitive data pervade the topic of hacking. However, few appear to have an understanding or could even refuse to comprehend the positive side of hacking because of the negative connotation attached to hacking. But, it is crucial that the aspect of hacking is demystified and its other positive sides revealed. II.    Black, Grey, and White Hacking Hacking is not entirely bad. What makes hacking bad is the illegality of the action and the motive behind a person’s decision to hack. Movies have helped to shape the conversation on hacking and hackers through the representation of a person wearing a hooded sweatshirt and typing as fast as they can to break into what they normally say is a ‘mainframe.’ Such representations have shaped people’s understanding of hacking, and few have little regard and understanding of the positive sides of hacking [2]. However, this kind of hacking with an intention to force one’s entry into an organization’s database, mainframe, or systems is known as black hat hacking. The positive side of hacking and one that is often not talked about, is known as white hat hacking. Lastly, grey hat hacking represents the middle ground between black hat hackers and white hat hackers. III.   Black Hat Hackers Black hat hackers are individuals who are rich in knowledge about computers, co...

Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These Other Research Paper Samples: