Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

White hat (computer security)

Index White hat (computer security)

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. [1]

42 relations: Black and white hat symbolism in film, Black hat, Bug bounty program, Certified Ethical Hacker, Computer Misuse Act 1990, Computer security, Dan Farmer, DEF CON, Denial-of-service attack, Exploit (computer security), Hacker, Hacker ethic, Information system, Internet, Internet slang, Intranet, IT risk, MalwareMustDie, Memory forensics, Metasploit Project, Multics, National CSS, National Security Agency, Nessus (software), Network security, Out-Law.com, Password cracking, Penetration test, Red team, Reverse engineering, Security Administrator Tool for Analyzing Networks, Security hacker, Social engineering (security), The New York Times, Tiger team, United States Air Force, United States Armed Forces, Vulnerability (computing), W3af, Western (genre), Wietse Venema, Wireless identity theft.

Black and white hat symbolism in film

In United States films of the Western genre between the 1920s and the 1940s, white hats were often worn by heroes and black hats by villains to symbolize the contrast in good versus evil.

New!!: White hat (computer security) and Black and white hat symbolism in film · See more »

Black hat

A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".

New!!: White hat (computer security) and Black hat · See more »

Bug bounty program

A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities.

New!!: White hat (computer security) and Bug bounty program · See more »

Certified Ethical Hacker

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems, answering multiple choice questions regarding penetration testing techniques.

New!!: White hat (computer security) and Certified Ethical Hacker · See more »

Computer Misuse Act 1990

The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063 (see below).

New!!: White hat (computer security) and Computer Misuse Act 1990 · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: White hat (computer security) and Computer security · See more »

Dan Farmer

Dan Farmer (born April 5, 1962) is an American computer security researcher and programmer who was a pioneer in the development of vulnerability scanners for Unix operating systems and computer networks.

New!!: White hat (computer security) and Dan Farmer · See more »

DEF CON

DEF CON (also written as DEFCON, Defcon, or DC) is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada, with the first DEF CON taking place in June 1993.

New!!: White hat (computer security) and DEF CON · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: White hat (computer security) and Denial-of-service attack · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: White hat (computer security) and Exploit (computer security) · See more »

Hacker

A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem.

New!!: White hat (computer security) and Hacker · See more »

Hacker ethic

Hacker ethic is a term for the moral values and philosophy that are common in hacker culture.

New!!: White hat (computer security) and Hacker ethic · See more »

Information system

An information system (IS) is an organized system for the collection, organization, storage and communication of information.

New!!: White hat (computer security) and Information system · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: White hat (computer security) and Internet · See more »

Internet slang

Internet slang (Internet shorthand, cyber-slang, netspeak, or chatspeak) refers to various kinds of slang used by different people on the Internet.

New!!: White hat (computer security) and Internet slang · See more »

Intranet

An intranet is a private network accessible only to an organization's staff.

New!!: White hat (computer security) and Intranet · See more »

IT risk

Information technology risk, IT risk, IT-related risk, or Cyber Risk is any risk related to information technology.

New!!: White hat (computer security) and IT risk · See more »

MalwareMustDie

No description.

New!!: White hat (computer security) and MalwareMustDie · See more »

Memory forensics

Memory forensics is forensic analysis of a computer's memory dump.

New!!: White hat (computer security) and Memory forensics · See more »

Metasploit Project

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

New!!: White hat (computer security) and Metasploit Project · See more »

Multics

Multics (Multiplexed Information and Computing Service) is an influential early time-sharing operating system, based around the concept of a single-level memory.

New!!: White hat (computer security) and Multics · See more »

National CSS

National CSS, Inc.

New!!: White hat (computer security) and National CSS · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: White hat (computer security) and National Security Agency · See more »

Nessus (software)

Nessus is a proprietary vulnerability scanner developed by Tenable Network Security.

New!!: White hat (computer security) and Nessus (software) · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: White hat (computer security) and Network security · See more »

Out-Law.com

Out-Law.com is a legal news and information site developed by international law firm Pinsent Masons.

New!!: White hat (computer security) and Out-Law.com · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: White hat (computer security) and Password cracking · See more »

Penetration test

A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.

New!!: White hat (computer security) and Penetration test · See more »

Red team

A red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.

New!!: White hat (computer security) and Red team · See more »

Reverse engineering

Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.

New!!: White hat (computer security) and Reverse engineering · See more »

Security Administrator Tool for Analyzing Networks

Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers.

New!!: White hat (computer security) and Security Administrator Tool for Analyzing Networks · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: White hat (computer security) and Security hacker · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: White hat (computer security) and Social engineering (security) · See more »

The New York Times

The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.

New!!: White hat (computer security) and The New York Times · See more »

Tiger team

A tiger team is a diversified group of experts brought together for a single project, need, or event.

New!!: White hat (computer security) and Tiger team · See more »

United States Air Force

The United States Air Force (USAF) is the aerial and space warfare service branch of the United States Armed Forces.

New!!: White hat (computer security) and United States Air Force · See more »

United States Armed Forces

The United States Armed Forces are the military forces of the United States of America.

New!!: White hat (computer security) and United States Armed Forces · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: White hat (computer security) and Vulnerability (computing) · See more »

W3af

w3af (web application attack and audit framework) is an open-source web application security scanner.

New!!: White hat (computer security) and W3af · See more »

Western (genre)

The Western is a genre of various arts which tell stories set primarily in the later half of the 19th century in the American Old West, often centering on the life of a nomadic cowboy or gunfighter armed with a revolver and a rifle who rides a horse.

New!!: White hat (computer security) and Western (genre) · See more »

Wietse Venema

Wietse Zweitze Venema (born 1951) is a Dutch programmer and physicist best known for writing the Postfix email system.

New!!: White hat (computer security) and Wietse Venema · See more »

Wireless identity theft

Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless (radio frequency) mechanics." Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon.

New!!: White hat (computer security) and Wireless identity theft · See more »

Redirects here:

Anti hacker, Anti-Hacker, Ethical Hacker, Ethical Hacking, Ethical hacker, Ethical hacking, White Hat, White hat (computing), White hat hacker, White hats, White-hat, White-hat hacker, White-hats, WhiteHat Adda, Whitehat, Whitehats.

References

[1] https://en.wikipedia.org/wiki/White_hat_(computer_security)

OutgoingIncoming
Hey! We are on Facebook now! »